Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
Typedeb
Namespacedebian
Namenetpbm-free
Version2:10.0-15.4
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2:10.97.00-1
Latest_non_vulnerable_version2:11.13.03+ds-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5wj4-5xbm-wuaz
vulnerability_id VCID-5wj4-5xbm-wuaz
summary Buffer overflow in pamtofits of NetPBM 10.30 through 10.33 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code when assembling the header, possibly related to an off-by-one error.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3145.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3145.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3145
reference_id
reference_type
scores
0
value 0.03748
scoring_system epss
scoring_elements 0.87965
published_at 2026-04-01T12:55:00Z
1
value 0.03748
scoring_system epss
scoring_elements 0.87975
published_at 2026-04-02T12:55:00Z
2
value 0.03748
scoring_system epss
scoring_elements 0.87989
published_at 2026-04-04T12:55:00Z
3
value 0.03748
scoring_system epss
scoring_elements 0.87994
published_at 2026-04-07T12:55:00Z
4
value 0.03748
scoring_system epss
scoring_elements 0.88014
published_at 2026-04-08T12:55:00Z
5
value 0.03748
scoring_system epss
scoring_elements 0.88021
published_at 2026-04-09T12:55:00Z
6
value 0.03748
scoring_system epss
scoring_elements 0.88031
published_at 2026-04-11T12:55:00Z
7
value 0.03748
scoring_system epss
scoring_elements 0.88024
published_at 2026-04-13T12:55:00Z
8
value 0.03748
scoring_system epss
scoring_elements 0.88037
published_at 2026-04-16T12:55:00Z
9
value 0.03748
scoring_system epss
scoring_elements 0.88036
published_at 2026-04-18T12:55:00Z
10
value 0.03748
scoring_system epss
scoring_elements 0.88035
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3145
fixed_packages
0
url pkg:deb/debian/netpbm-free@0?distro=trixie
purl pkg:deb/debian/netpbm-free@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2006-3145
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5wj4-5xbm-wuaz
1
url VCID-6379-1fut-nbhm
vulnerability_id VCID-6379-1fut-nbhm
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0146.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0146.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0146
reference_id
reference_type
scores
0
value 0.03882
scoring_system epss
scoring_elements 0.88188
published_at 2026-04-01T12:55:00Z
1
value 0.03882
scoring_system epss
scoring_elements 0.88196
published_at 2026-04-02T12:55:00Z
2
value 0.03882
scoring_system epss
scoring_elements 0.88212
published_at 2026-04-04T12:55:00Z
3
value 0.03882
scoring_system epss
scoring_elements 0.88218
published_at 2026-04-07T12:55:00Z
4
value 0.03882
scoring_system epss
scoring_elements 0.88237
published_at 2026-04-08T12:55:00Z
5
value 0.03882
scoring_system epss
scoring_elements 0.88243
published_at 2026-04-09T12:55:00Z
6
value 0.03882
scoring_system epss
scoring_elements 0.88255
published_at 2026-04-11T12:55:00Z
7
value 0.03882
scoring_system epss
scoring_elements 0.88247
published_at 2026-04-13T12:55:00Z
8
value 0.03882
scoring_system epss
scoring_elements 0.88261
published_at 2026-04-16T12:55:00Z
9
value 0.03882
scoring_system epss
scoring_elements 0.8826
published_at 2026-04-18T12:55:00Z
10
value 0.03882
scoring_system epss
scoring_elements 0.88259
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0146
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0146
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616985
reference_id 1616985
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616985
4
reference_url https://access.redhat.com/errata/RHSA-2003:060
reference_id RHSA-2003:060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:060
5
reference_url https://access.redhat.com/errata/RHSA-2003:061
reference_id RHSA-2003:061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:061
fixed_packages
0
url pkg:deb/debian/netpbm-free@2:9.20-9?distro=trixie
purl pkg:deb/debian/netpbm-free@2:9.20-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:9.20-9%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2003-0146
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6379-1fut-nbhm
2
url VCID-8fjp-kfqu-x7da
vulnerability_id VCID-8fjp-kfqu-x7da
summary netpbm: Out-of-bounds write in writeRasterPbm() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2581.json
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2581
reference_id
reference_type
scores
0
value 0.00264
scoring_system epss
scoring_elements 0.4987
published_at 2026-04-01T12:55:00Z
1
value 0.00264
scoring_system epss
scoring_elements 0.49908
published_at 2026-04-02T12:55:00Z
2
value 0.00264
scoring_system epss
scoring_elements 0.49935
published_at 2026-04-04T12:55:00Z
3
value 0.00264
scoring_system epss
scoring_elements 0.49885
published_at 2026-04-07T12:55:00Z
4
value 0.00264
scoring_system epss
scoring_elements 0.4994
published_at 2026-04-08T12:55:00Z
5
value 0.00264
scoring_system epss
scoring_elements 0.49933
published_at 2026-04-09T12:55:00Z
6
value 0.00264
scoring_system epss
scoring_elements 0.49951
published_at 2026-04-11T12:55:00Z
7
value 0.00264
scoring_system epss
scoring_elements 0.49923
published_at 2026-04-12T12:55:00Z
8
value 0.00264
scoring_system epss
scoring_elements 0.49924
published_at 2026-04-13T12:55:00Z
9
value 0.00264
scoring_system epss
scoring_elements 0.4997
published_at 2026-04-16T12:55:00Z
10
value 0.00264
scoring_system epss
scoring_elements 0.49971
published_at 2026-04-18T12:55:00Z
11
value 0.00264
scoring_system epss
scoring_elements 0.49943
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2581
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411409
reference_id 1411409
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411409
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854978
reference_id 854978
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854978
fixed_packages
0
url pkg:deb/debian/netpbm-free@0?distro=trixie
purl pkg:deb/debian/netpbm-free@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:10.97.00-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.97.00-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.97.00-1%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
6
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2017-2581
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fjp-kfqu-x7da
3
url VCID-8hkk-cuf8-c3fp
vulnerability_id VCID-8hkk-cuf8-c3fp
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3632.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3632
reference_id
reference_type
scores
0
value 0.00245
scoring_system epss
scoring_elements 0.4779
published_at 2026-04-21T12:55:00Z
1
value 0.00245
scoring_system epss
scoring_elements 0.47722
published_at 2026-04-01T12:55:00Z
2
value 0.00245
scoring_system epss
scoring_elements 0.4776
published_at 2026-04-02T12:55:00Z
3
value 0.00245
scoring_system epss
scoring_elements 0.47779
published_at 2026-04-12T12:55:00Z
4
value 0.00245
scoring_system epss
scoring_elements 0.47728
published_at 2026-04-07T12:55:00Z
5
value 0.00245
scoring_system epss
scoring_elements 0.47783
published_at 2026-04-08T12:55:00Z
6
value 0.00245
scoring_system epss
scoring_elements 0.47803
published_at 2026-04-11T12:55:00Z
7
value 0.00245
scoring_system epss
scoring_elements 0.47789
published_at 2026-04-13T12:55:00Z
8
value 0.00245
scoring_system epss
scoring_elements 0.47844
published_at 2026-04-16T12:55:00Z
9
value 0.00245
scoring_system epss
scoring_elements 0.47837
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3632
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3632
3
reference_url http://secunia.com/advisories/17544
reference_id
reference_type
scores
url http://secunia.com/advisories/17544
4
reference_url http://secunia.com/advisories/17671
reference_id
reference_type
scores
url http://secunia.com/advisories/17671
5
reference_url http://secunia.com/advisories/17679
reference_id
reference_type
scores
url http://secunia.com/advisories/17679
6
reference_url http://secunia.com/advisories/17828
reference_id
reference_type
scores
url http://secunia.com/advisories/17828
7
reference_url http://secunia.com/advisories/18186
reference_id
reference_type
scores
url http://secunia.com/advisories/18186
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11165
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11165
9
reference_url http://www.debian.org/security/2005/dsa-904
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-904
10
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:217
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:217
11
reference_url http://www.novell.com/linux/security/advisories/2005_28_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_28_sr.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2005-843.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-843.html
13
reference_url http://www.securityfocus.com/bid/15514
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15514
14
reference_url http://www.vupen.com/english/advisories/2005/2418
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2418
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617833
reference_id 1617833
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617833
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639
reference_id 351639
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3632
reference_id CVE-2005-3632
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3632
25
reference_url https://access.redhat.com/errata/RHSA-2005:843
reference_id RHSA-2005:843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:843
26
reference_url https://usn.ubuntu.com/218-1/
reference_id USN-218-1
reference_type
scores
url https://usn.ubuntu.com/218-1/
fixed_packages
0
url pkg:deb/debian/netpbm-free@2:10.0-10.1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-10.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-10.1%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2005-3632
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8hkk-cuf8-c3fp
4
url VCID-8x21-r48h-affp
vulnerability_id VCID-8x21-r48h-affp
summary netpbm: Insufficient size check of memory allocation in createCanvas() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2587.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2587.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2587
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.3317
published_at 2026-04-01T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.33298
published_at 2026-04-02T12:55:00Z
2
value 0.00135
scoring_system epss
scoring_elements 0.3333
published_at 2026-04-04T12:55:00Z
3
value 0.00135
scoring_system epss
scoring_elements 0.33163
published_at 2026-04-07T12:55:00Z
4
value 0.00135
scoring_system epss
scoring_elements 0.33206
published_at 2026-04-08T12:55:00Z
5
value 0.00135
scoring_system epss
scoring_elements 0.3324
published_at 2026-04-09T12:55:00Z
6
value 0.00135
scoring_system epss
scoring_elements 0.33243
published_at 2026-04-11T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.33202
published_at 2026-04-12T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.33179
published_at 2026-04-13T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.33219
published_at 2026-04-16T12:55:00Z
10
value 0.00135
scoring_system epss
scoring_elements 0.33197
published_at 2026-04-18T12:55:00Z
11
value 0.00135
scoring_system epss
scoring_elements 0.3316
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2587
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1419542
reference_id 1419542
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1419542
fixed_packages
0
url pkg:deb/debian/netpbm-free@0?distro=trixie
purl pkg:deb/debian/netpbm-free@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2017-2587
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8x21-r48h-affp
5
url VCID-932v-xwug-nbfy
vulnerability_id VCID-932v-xwug-nbfy
summary
Multiple memory management errors in JasPer might lead to execution of
    arbitrary code via jpeg2k files.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=222819
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=222819
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-0698.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0698.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3520.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3520.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3520
reference_id
reference_type
scores
0
value 0.02999
scoring_system epss
scoring_elements 0.86574
published_at 2026-04-21T12:55:00Z
1
value 0.02999
scoring_system epss
scoring_elements 0.86581
published_at 2026-04-18T12:55:00Z
2
value 0.02999
scoring_system epss
scoring_elements 0.86501
published_at 2026-04-01T12:55:00Z
3
value 0.02999
scoring_system epss
scoring_elements 0.86511
published_at 2026-04-02T12:55:00Z
4
value 0.02999
scoring_system epss
scoring_elements 0.8653
published_at 2026-04-04T12:55:00Z
5
value 0.02999
scoring_system epss
scoring_elements 0.86528
published_at 2026-04-07T12:55:00Z
6
value 0.02999
scoring_system epss
scoring_elements 0.86548
published_at 2026-04-08T12:55:00Z
7
value 0.02999
scoring_system epss
scoring_elements 0.86558
published_at 2026-04-09T12:55:00Z
8
value 0.02999
scoring_system epss
scoring_elements 0.86573
published_at 2026-04-11T12:55:00Z
9
value 0.02999
scoring_system epss
scoring_elements 0.86569
published_at 2026-04-12T12:55:00Z
10
value 0.02999
scoring_system epss
scoring_elements 0.86563
published_at 2026-04-13T12:55:00Z
11
value 0.02999
scoring_system epss
scoring_elements 0.86576
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3520
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520
5
reference_url http://secunia.com/advisories/33173
reference_id
reference_type
scores
url http://secunia.com/advisories/33173
6
reference_url http://secunia.com/advisories/34391
reference_id
reference_type
scores
url http://secunia.com/advisories/34391
7
reference_url http://security.gentoo.org/glsa/glsa-200812-18.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-18.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45621
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45621
9
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10141
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10141
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:142
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:144
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:164
13
reference_url http://www.redhat.com/support/errata/RHSA-2009-0012.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0012.html
14
reference_url http://www.securityfocus.com/bid/31470
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31470
15
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
16
reference_url http://www.ubuntu.com/usn/USN-742-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-742-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=461476
reference_id 461476
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=461476
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778
reference_id 559778
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778
19
reference_url https://security.archlinux.org/AVG-99
reference_id AVG-99
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-99
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3520
reference_id CVE-2008-3520
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3520
22
reference_url https://security.gentoo.org/glsa/200812-18
reference_id GLSA-200812-18
reference_type
scores
url https://security.gentoo.org/glsa/200812-18
23
reference_url https://access.redhat.com/errata/RHSA-2009:0012
reference_id RHSA-2009:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0012
24
reference_url https://access.redhat.com/errata/RHSA-2015:0698
reference_id RHSA-2015:0698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0698
25
reference_url https://usn.ubuntu.com/1317-1/
reference_id USN-1317-1
reference_type
scores
url https://usn.ubuntu.com/1317-1/
26
reference_url https://usn.ubuntu.com/742-1/
reference_id USN-742-1
reference_type
scores
url https://usn.ubuntu.com/742-1/
fixed_packages
0
url pkg:deb/debian/netpbm-free@0?distro=trixie
purl pkg:deb/debian/netpbm-free@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2008-3520
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-932v-xwug-nbfy
6
url VCID-ma8q-csum-fqa9
vulnerability_id VCID-ma8q-csum-fqa9
summary pamperspective in Netpbm before 10.35.48 does not properly calculate a window height, which allows context-dependent attackers to cause a denial of service (crash) via a crafted image file that triggers an out-of-bounds read.
references
0
reference_url http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY
reference_id
reference_type
scores
url http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4799.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4799.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4799
reference_id
reference_type
scores
0
value 0.00542
scoring_system epss
scoring_elements 0.67713
published_at 2026-04-21T12:55:00Z
1
value 0.00542
scoring_system epss
scoring_elements 0.67606
published_at 2026-04-01T12:55:00Z
2
value 0.00542
scoring_system epss
scoring_elements 0.67642
published_at 2026-04-02T12:55:00Z
3
value 0.00542
scoring_system epss
scoring_elements 0.67663
published_at 2026-04-04T12:55:00Z
4
value 0.00542
scoring_system epss
scoring_elements 0.67643
published_at 2026-04-07T12:55:00Z
5
value 0.00542
scoring_system epss
scoring_elements 0.67694
published_at 2026-04-08T12:55:00Z
6
value 0.00542
scoring_system epss
scoring_elements 0.67709
published_at 2026-04-09T12:55:00Z
7
value 0.00542
scoring_system epss
scoring_elements 0.67732
published_at 2026-04-11T12:55:00Z
8
value 0.00542
scoring_system epss
scoring_elements 0.67717
published_at 2026-04-12T12:55:00Z
9
value 0.00542
scoring_system epss
scoring_elements 0.67684
published_at 2026-04-13T12:55:00Z
10
value 0.00542
scoring_system epss
scoring_elements 0.6772
published_at 2026-04-16T12:55:00Z
11
value 0.00542
scoring_system epss
scoring_elements 0.67733
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4799
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46054
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46054
4
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00058.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00058.html
5
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00069.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00069.html
6
reference_url http://www.openwall.com/lists/oss-security/2008/10/22/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/22/7
7
reference_url http://www.openwall.com/lists/oss-security/2008/10/23/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/10/23/2
8
reference_url http://www.securityfocus.com/bid/31871
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31871
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.25:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.26:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.27:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.28:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.29:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.30:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.31:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.32:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.33:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.34:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.00:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.01:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.02:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.03:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.04:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.05:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.06:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.07:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.08:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.09:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.11:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.12:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.13:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.14:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.15:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.16:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.17:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.18:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.19:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.20:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.21:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.22:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.23:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.24:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.25:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.26:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.27:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.28:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.29:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.30:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.31:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.32:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.33:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.34:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.35:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.36:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.37:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.38:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.38:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.38:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.39:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.39:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.39:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.40:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.40:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.40:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.41:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.41:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.41:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.42:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.42:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.43:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.43:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.43:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.44:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.44:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.44:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.45:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.45:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.45:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.46:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.35.46:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.46:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.3:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.4:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.0:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.1:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.10:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.11:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.12:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.13:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.14:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.15:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.16:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.17:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.18:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.19:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.2:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.3:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.4:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.5:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.6:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.7:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.8:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.9:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4799
reference_id CVE-2008-4799
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4799
fixed_packages
0
url pkg:deb/debian/netpbm-free@0?distro=trixie
purl pkg:deb/debian/netpbm-free@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2008-4799
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ma8q-csum-fqa9
7
url VCID-mbac-cudj-wfaj
vulnerability_id VCID-mbac-cudj-wfaj
summary
A vulnerability in Netpbm could result in execution of arbitrary
    code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4274.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4274.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-4274
reference_id
reference_type
scores
0
value 0.02543
scoring_system epss
scoring_elements 0.85471
published_at 2026-04-12T12:55:00Z
1
value 0.02543
scoring_system epss
scoring_elements 0.85467
published_at 2026-04-13T12:55:00Z
2
value 0.02543
scoring_system epss
scoring_elements 0.85491
published_at 2026-04-16T12:55:00Z
3
value 0.02543
scoring_system epss
scoring_elements 0.85495
published_at 2026-04-18T12:55:00Z
4
value 0.02543
scoring_system epss
scoring_elements 0.85492
published_at 2026-04-21T12:55:00Z
5
value 0.02611
scoring_system epss
scoring_elements 0.85635
published_at 2026-04-09T12:55:00Z
6
value 0.02611
scoring_system epss
scoring_elements 0.85569
published_at 2026-04-01T12:55:00Z
7
value 0.02611
scoring_system epss
scoring_elements 0.8565
published_at 2026-04-11T12:55:00Z
8
value 0.02611
scoring_system epss
scoring_elements 0.85581
published_at 2026-04-02T12:55:00Z
9
value 0.02611
scoring_system epss
scoring_elements 0.85598
published_at 2026-04-04T12:55:00Z
10
value 0.02611
scoring_system epss
scoring_elements 0.85604
published_at 2026-04-07T12:55:00Z
11
value 0.02611
scoring_system epss
scoring_elements 0.85624
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-4274
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4274
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=546580
reference_id 546580
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=546580
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569060
reference_id 569060
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569060
5
reference_url https://security.gentoo.org/glsa/201311-08
reference_id GLSA-201311-08
reference_type
scores
url https://security.gentoo.org/glsa/201311-08
6
reference_url https://access.redhat.com/errata/RHSA-2011:1811
reference_id RHSA-2011:1811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1811
7
reference_url https://usn.ubuntu.com/934-1/
reference_id USN-934-1
reference_type
scores
url https://usn.ubuntu.com/934-1/
fixed_packages
0
url pkg:deb/debian/netpbm-free@2:10.0-12.2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-12.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-12.2%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2009-4274
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mbac-cudj-wfaj
8
url VCID-q4qe-yn6z-nqhk
vulnerability_id VCID-q4qe-yn6z-nqhk
summary netpbm: Out-of-bounds read in expandCodeOntoStack()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2579.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2579.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2579
reference_id
reference_type
scores
0
value 0.00443
scoring_system epss
scoring_elements 0.63262
published_at 2026-04-01T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63322
published_at 2026-04-02T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63349
published_at 2026-04-04T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.63315
published_at 2026-04-07T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.63366
published_at 2026-04-21T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.63384
published_at 2026-04-12T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.63401
published_at 2026-04-11T12:55:00Z
7
value 0.00443
scoring_system epss
scoring_elements 0.63348
published_at 2026-04-13T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63381
published_at 2026-04-16T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.63389
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2579
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411404
reference_id 1411404
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411404
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854978
reference_id 854978
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854978
fixed_packages
0
url pkg:deb/debian/netpbm-free@0?distro=trixie
purl pkg:deb/debian/netpbm-free@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:10.97.00-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.97.00-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.97.00-1%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
6
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2017-2579
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4qe-yn6z-nqhk
9
url VCID-qa1v-juda-mbgv
vulnerability_id VCID-qa1v-juda-mbgv
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2978.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2978.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2978
reference_id
reference_type
scores
0
value 0.04583
scoring_system epss
scoring_elements 0.8923
published_at 2026-04-21T12:55:00Z
1
value 0.04583
scoring_system epss
scoring_elements 0.89174
published_at 2026-04-01T12:55:00Z
2
value 0.04583
scoring_system epss
scoring_elements 0.8918
published_at 2026-04-02T12:55:00Z
3
value 0.04583
scoring_system epss
scoring_elements 0.89194
published_at 2026-04-04T12:55:00Z
4
value 0.04583
scoring_system epss
scoring_elements 0.89197
published_at 2026-04-07T12:55:00Z
5
value 0.04583
scoring_system epss
scoring_elements 0.89215
published_at 2026-04-08T12:55:00Z
6
value 0.04583
scoring_system epss
scoring_elements 0.89219
published_at 2026-04-09T12:55:00Z
7
value 0.04583
scoring_system epss
scoring_elements 0.89229
published_at 2026-04-11T12:55:00Z
8
value 0.04583
scoring_system epss
scoring_elements 0.89225
published_at 2026-04-12T12:55:00Z
9
value 0.04583
scoring_system epss
scoring_elements 0.89222
published_at 2026-04-13T12:55:00Z
10
value 0.04583
scoring_system epss
scoring_elements 0.89234
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2978
2
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2978
4
reference_url http://secunia.com/advisories/17221
reference_id
reference_type
scores
url http://secunia.com/advisories/17221
5
reference_url http://secunia.com/advisories/17222
reference_id
reference_type
scores
url http://secunia.com/advisories/17222
6
reference_url http://secunia.com/advisories/17256
reference_id
reference_type
scores
url http://secunia.com/advisories/17256
7
reference_url http://secunia.com/advisories/17265
reference_id
reference_type
scores
url http://secunia.com/advisories/17265
8
reference_url http://secunia.com/advisories/17282
reference_id
reference_type
scores
url http://secunia.com/advisories/17282
9
reference_url http://secunia.com/advisories/17357
reference_id
reference_type
scores
url http://secunia.com/advisories/17357
10
reference_url http://securitytracker.com/id?1015071
reference_id
reference_type
scores
url http://securitytracker.com/id?1015071
11
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135
12
reference_url http://www.debian.org/security/2005/dsa-878
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-878
13
reference_url http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml
14
reference_url http://www.novell.com/linux/security/advisories/2005_24_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_24_sr.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2005-793.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-793.html
16
reference_url http://www.securityfocus.com/bid/15128
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15128
17
reference_url http://www.vupen.com/english/advisories/2005/2133
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2133
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617774
reference_id 1617774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617774
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2978
reference_id CVE-2005-2978
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2978
45
reference_url https://access.redhat.com/errata/RHSA-2005:793
reference_id RHSA-2005:793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:793
46
reference_url https://usn.ubuntu.com/210-1/
reference_id USN-210-1
reference_type
scores
url https://usn.ubuntu.com/210-1/
fixed_packages
0
url pkg:deb/debian/netpbm-free@2:10.0-10?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-10%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2005-2978
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qa1v-juda-mbgv
10
url VCID-qxkx-jxqj-8yhb
vulnerability_id VCID-qxkx-jxqj-8yhb
summary netpbm: heap-buffer-overflow in pm_mallocarray2 function in lib/util/mallocvar.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8975.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8975.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8975
reference_id
reference_type
scores
0
value 0.00454
scoring_system epss
scoring_elements 0.63729
published_at 2026-04-01T12:55:00Z
1
value 0.00454
scoring_system epss
scoring_elements 0.6379
published_at 2026-04-02T12:55:00Z
2
value 0.00454
scoring_system epss
scoring_elements 0.63816
published_at 2026-04-04T12:55:00Z
3
value 0.00454
scoring_system epss
scoring_elements 0.63774
published_at 2026-04-07T12:55:00Z
4
value 0.00454
scoring_system epss
scoring_elements 0.63824
published_at 2026-04-08T12:55:00Z
5
value 0.00454
scoring_system epss
scoring_elements 0.63841
published_at 2026-04-12T12:55:00Z
6
value 0.00454
scoring_system epss
scoring_elements 0.63856
published_at 2026-04-11T12:55:00Z
7
value 0.00475
scoring_system epss
scoring_elements 0.64822
published_at 2026-04-21T12:55:00Z
8
value 0.00475
scoring_system epss
scoring_elements 0.64787
published_at 2026-04-13T12:55:00Z
9
value 0.00475
scoring_system epss
scoring_elements 0.64825
published_at 2026-04-16T12:55:00Z
10
value 0.00475
scoring_system epss
scoring_elements 0.64835
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8975
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1561206
reference_id 1561206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1561206
fixed_packages
0
url pkg:deb/debian/netpbm-free@0?distro=trixie
purl pkg:deb/debian/netpbm-free@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2018-8975
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qxkx-jxqj-8yhb
11
url VCID-qyx6-j4fm-cbc9
vulnerability_id VCID-qyx6-j4fm-cbc9
summary security flaw
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3662.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3662.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3662
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51352
published_at 2026-04-21T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51225
published_at 2026-04-01T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51277
published_at 2026-04-02T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51302
published_at 2026-04-04T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51261
published_at 2026-04-07T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51316
published_at 2026-04-08T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51313
published_at 2026-04-09T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51357
published_at 2026-04-11T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51336
published_at 2026-04-12T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51322
published_at 2026-04-13T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51364
published_at 2026-04-16T12:55:00Z
11
value 0.00279
scoring_system epss
scoring_elements 0.51372
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3662
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3662
4
reference_url http://secunia.com/advisories/17544
reference_id
reference_type
scores
url http://secunia.com/advisories/17544
5
reference_url http://secunia.com/advisories/17671
reference_id
reference_type
scores
url http://secunia.com/advisories/17671
6
reference_url http://secunia.com/advisories/17679
reference_id
reference_type
scores
url http://secunia.com/advisories/17679
7
reference_url http://secunia.com/advisories/17828
reference_id
reference_type
scores
url http://secunia.com/advisories/17828
8
reference_url http://secunia.com/advisories/18186
reference_id
reference_type
scores
url http://secunia.com/advisories/18186
9
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
10
reference_url http://sourceforge.net/project/shownotes.php?release_id=370545
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=370545
11
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9583
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9583
12
reference_url http://www.debian.org/security/2005/dsa-904
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-904
13
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:217
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:217
14
reference_url http://www.novell.com/linux/security/advisories/2005_28_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_28_sr.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2005-843.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-843.html
16
reference_url http://www.securityfocus.com/bid/15427
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15427
17
reference_url http://www.vupen.com/english/advisories/2005/2418
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2418
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617836
reference_id 1617836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617836
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639
reference_id 351639
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:greg_roelofs:pnmtopng:2.37.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:greg_roelofs:pnmtopng:2.37.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:greg_roelofs:pnmtopng:2.37.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:greg_roelofs:pnmtopng:2.37.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.38:*:*:*:*:*:*:*
reference_id cpe:2.3:a:greg_roelofs:pnmtopng:2.38:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.38:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3662
reference_id CVE-2005-3662
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3662
26
reference_url https://access.redhat.com/errata/RHSA-2005:843
reference_id RHSA-2005:843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:843
27
reference_url https://usn.ubuntu.com/218-1/
reference_id USN-218-1
reference_type
scores
url https://usn.ubuntu.com/218-1/
fixed_packages
0
url pkg:deb/debian/netpbm-free@2:10.0-10.1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-10.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-10.1%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2005-3662
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qyx6-j4fm-cbc9
12
url VCID-rhmk-vmzk-hybk
vulnerability_id VCID-rhmk-vmzk-hybk
summary netpbm: Calls TIFFRGBA with width and height parameters switched
references
0
reference_url http://bugzilla.maptools.org/show_bug.cgi?id=2654
reference_id
reference_type
scores
url http://bugzilla.maptools.org/show_bug.cgi?id=2654
1
reference_url http://bugzilla.maptools.org/show_bug.cgi?id=2655
reference_id
reference_type
scores
url http://bugzilla.maptools.org/show_bug.cgi?id=2655
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5849.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5849.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5849
reference_id
reference_type
scores
0
value 0.00234
scoring_system epss
scoring_elements 0.46185
published_at 2026-04-01T12:55:00Z
1
value 0.00234
scoring_system epss
scoring_elements 0.46253
published_at 2026-04-21T12:55:00Z
2
value 0.00234
scoring_system epss
scoring_elements 0.46247
published_at 2026-04-12T12:55:00Z
3
value 0.00234
scoring_system epss
scoring_elements 0.46256
published_at 2026-04-13T12:55:00Z
4
value 0.00234
scoring_system epss
scoring_elements 0.46313
published_at 2026-04-16T12:55:00Z
5
value 0.00234
scoring_system epss
scoring_elements 0.4631
published_at 2026-04-18T12:55:00Z
6
value 0.00234
scoring_system epss
scoring_elements 0.46227
published_at 2026-04-02T12:55:00Z
7
value 0.00234
scoring_system epss
scoring_elements 0.46246
published_at 2026-04-04T12:55:00Z
8
value 0.00234
scoring_system epss
scoring_elements 0.46194
published_at 2026-04-07T12:55:00Z
9
value 0.00234
scoring_system epss
scoring_elements 0.4625
published_at 2026-04-08T12:55:00Z
10
value 0.00234
scoring_system epss
scoring_elements 0.46252
published_at 2026-04-09T12:55:00Z
11
value 0.00234
scoring_system epss
scoring_elements 0.46275
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5849
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF42A624FXVY3BYBHMAO6F2X7EJYHQE2/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF42A624FXVY3BYBHMAO6F2X7EJYHQE2/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LDK3BDMKIQL2NQ3SJZXPBEN2LSOUSSEE/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LDK3BDMKIQL2NQ3SJZXPBEN2LSOUSSEE/
7
reference_url http://www.openwall.com/lists/oss-security/2017/02/02/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/02/02/2
8
reference_url http://www.securityfocus.com/bid/96011
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/96011
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1419650
reference_id 1419650
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1419650
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm_project:netpbm:10.47.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm_project:netpbm:10.47.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm_project:netpbm:10.47.63:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5849
reference_id CVE-2017-5849
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5849
fixed_packages
0
url pkg:deb/debian/netpbm-free@0?distro=trixie
purl pkg:deb/debian/netpbm-free@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2017-5849
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rhmk-vmzk-hybk
13
url VCID-rqj6-vs48-ufbd
vulnerability_id VCID-rqj6-vs48-ufbd
summary
Utilities included in old Netpbm versions are vulnerable to multiple
    temporary files issues, potentially allowing a local attacker to overwrite
    files with the rights of the user running the utility.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0924.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0924.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0924
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27646
published_at 2026-04-01T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27686
published_at 2026-04-02T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27724
published_at 2026-04-04T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27514
published_at 2026-04-07T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27582
published_at 2026-04-08T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27625
published_at 2026-04-09T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.2763
published_at 2026-04-11T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27586
published_at 2026-04-12T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27529
published_at 2026-04-13T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27538
published_at 2026-04-16T12:55:00Z
10
value 0.00099
scoring_system epss
scoring_elements 0.2751
published_at 2026-04-18T12:55:00Z
11
value 0.00099
scoring_system epss
scoring_elements 0.27472
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0924
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617099
reference_id 1617099
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617099
4
reference_url https://security.gentoo.org/glsa/200410-02
reference_id GLSA-200410-02
reference_type
scores
url https://security.gentoo.org/glsa/200410-02
5
reference_url https://access.redhat.com/errata/RHSA-2004:030
reference_id RHSA-2004:030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:030
6
reference_url https://access.redhat.com/errata/RHSA-2004:031
reference_id RHSA-2004:031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:031
fixed_packages
0
url pkg:deb/debian/netpbm-free@2:9.25-9?distro=trixie
purl pkg:deb/debian/netpbm-free@2:9.25-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:9.25-9%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2003-0924
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rqj6-vs48-ufbd
14
url VCID-s9g2-dgbd-akgx
vulnerability_id VCID-s9g2-dgbd-akgx
summary netpbm: GIF handling buffer overflow in giftopnm
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0554.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0554.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0554
reference_id
reference_type
scores
0
value 0.01722
scoring_system epss
scoring_elements 0.8233
published_at 2026-04-01T12:55:00Z
1
value 0.01722
scoring_system epss
scoring_elements 0.82344
published_at 2026-04-02T12:55:00Z
2
value 0.01722
scoring_system epss
scoring_elements 0.82361
published_at 2026-04-04T12:55:00Z
3
value 0.01722
scoring_system epss
scoring_elements 0.82357
published_at 2026-04-07T12:55:00Z
4
value 0.01722
scoring_system epss
scoring_elements 0.82385
published_at 2026-04-08T12:55:00Z
5
value 0.01722
scoring_system epss
scoring_elements 0.82392
published_at 2026-04-09T12:55:00Z
6
value 0.01722
scoring_system epss
scoring_elements 0.82411
published_at 2026-04-11T12:55:00Z
7
value 0.01722
scoring_system epss
scoring_elements 0.82408
published_at 2026-04-12T12:55:00Z
8
value 0.01722
scoring_system epss
scoring_elements 0.82402
published_at 2026-04-13T12:55:00Z
9
value 0.01722
scoring_system epss
scoring_elements 0.82436
published_at 2026-04-16T12:55:00Z
10
value 0.01722
scoring_system epss
scoring_elements 0.82437
published_at 2026-04-18T12:55:00Z
11
value 0.01722
scoring_system epss
scoring_elements 0.82442
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0554
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0554
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431525
reference_id 431525
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431525
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464056
reference_id 464056
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464056
5
reference_url https://access.redhat.com/errata/RHSA-2008:0131
reference_id RHSA-2008:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0131
6
reference_url https://usn.ubuntu.com/665-1/
reference_id USN-665-1
reference_type
scores
url https://usn.ubuntu.com/665-1/
fixed_packages
0
url pkg:deb/debian/netpbm-free@10.0-11.1?distro=trixie
purl pkg:deb/debian/netpbm-free@10.0-11.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@10.0-11.1%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2008-0554
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s9g2-dgbd-akgx
15
url VCID-tqtm-achn-z3fg
vulnerability_id VCID-tqtm-achn-z3fg
summary
Multiple memory management errors in JasPer might lead to execution of
    arbitrary code via jpeg2k files.
references
0
reference_url http://bugs.gentoo.org/attachment.cgi?id=163282&action=view
reference_id
reference_type
scores
url http://bugs.gentoo.org/attachment.cgi?id=163282&action=view
1
reference_url http://bugs.gentoo.org/show_bug.cgi?id=222819
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=222819
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-0698.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0698.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3522.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3522.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3522
reference_id
reference_type
scores
0
value 0.0425
scoring_system epss
scoring_elements 0.88817
published_at 2026-04-21T12:55:00Z
1
value 0.0425
scoring_system epss
scoring_elements 0.8882
published_at 2026-04-18T12:55:00Z
2
value 0.0425
scoring_system epss
scoring_elements 0.88753
published_at 2026-04-01T12:55:00Z
3
value 0.0425
scoring_system epss
scoring_elements 0.88762
published_at 2026-04-02T12:55:00Z
4
value 0.0425
scoring_system epss
scoring_elements 0.88777
published_at 2026-04-04T12:55:00Z
5
value 0.0425
scoring_system epss
scoring_elements 0.88779
published_at 2026-04-07T12:55:00Z
6
value 0.0425
scoring_system epss
scoring_elements 0.88796
published_at 2026-04-08T12:55:00Z
7
value 0.0425
scoring_system epss
scoring_elements 0.88801
published_at 2026-04-09T12:55:00Z
8
value 0.0425
scoring_system epss
scoring_elements 0.88813
published_at 2026-04-11T12:55:00Z
9
value 0.0425
scoring_system epss
scoring_elements 0.88808
published_at 2026-04-13T12:55:00Z
10
value 0.0425
scoring_system epss
scoring_elements 0.88822
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522
6
reference_url http://secunia.com/advisories/33173
reference_id
reference_type
scores
url http://secunia.com/advisories/33173
7
reference_url http://secunia.com/advisories/34391
reference_id
reference_type
scores
url http://secunia.com/advisories/34391
8
reference_url http://security.gentoo.org/glsa/glsa-200812-18.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-18.xml
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45623
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45623
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:142
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:144
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:164
13
reference_url http://www.securityfocus.com/bid/31470
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31470
14
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
15
reference_url http://www.ubuntu.com/usn/USN-742-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-742-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=461478
reference_id 461478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=461478
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778
reference_id 559778
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778
18
reference_url https://security.archlinux.org/AVG-99
reference_id AVG-99
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-99
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3522
reference_id CVE-2008-3522
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3522
22
reference_url https://security.gentoo.org/glsa/200812-18
reference_id GLSA-200812-18
reference_type
scores
url https://security.gentoo.org/glsa/200812-18
23
reference_url https://access.redhat.com/errata/RHSA-2015:0698
reference_id RHSA-2015:0698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0698
24
reference_url https://usn.ubuntu.com/1317-1/
reference_id USN-1317-1
reference_type
scores
url https://usn.ubuntu.com/1317-1/
25
reference_url https://usn.ubuntu.com/742-1/
reference_id USN-742-1
reference_type
scores
url https://usn.ubuntu.com/742-1/
fixed_packages
0
url pkg:deb/debian/netpbm-free@0?distro=trixie
purl pkg:deb/debian/netpbm-free@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2008-3522
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tqtm-achn-z3fg
16
url VCID-tuqm-jg2y-zqak
vulnerability_id VCID-tuqm-jg2y-zqak
summary netpbm: Out-of-bounds write of heap data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2580.json
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2580.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2580
reference_id
reference_type
scores
0
value 0.0029
scoring_system epss
scoring_elements 0.52331
published_at 2026-04-01T12:55:00Z
1
value 0.0029
scoring_system epss
scoring_elements 0.52376
published_at 2026-04-02T12:55:00Z
2
value 0.0029
scoring_system epss
scoring_elements 0.52403
published_at 2026-04-04T12:55:00Z
3
value 0.0029
scoring_system epss
scoring_elements 0.52369
published_at 2026-04-07T12:55:00Z
4
value 0.0029
scoring_system epss
scoring_elements 0.52421
published_at 2026-04-08T12:55:00Z
5
value 0.0029
scoring_system epss
scoring_elements 0.52417
published_at 2026-04-09T12:55:00Z
6
value 0.0029
scoring_system epss
scoring_elements 0.52468
published_at 2026-04-11T12:55:00Z
7
value 0.0029
scoring_system epss
scoring_elements 0.52452
published_at 2026-04-12T12:55:00Z
8
value 0.0029
scoring_system epss
scoring_elements 0.52435
published_at 2026-04-13T12:55:00Z
9
value 0.0029
scoring_system epss
scoring_elements 0.52475
published_at 2026-04-16T12:55:00Z
10
value 0.0029
scoring_system epss
scoring_elements 0.52482
published_at 2026-04-18T12:55:00Z
11
value 0.0029
scoring_system epss
scoring_elements 0.52467
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2580
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411408
reference_id 1411408
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411408
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854978
reference_id 854978
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854978
fixed_packages
0
url pkg:deb/debian/netpbm-free@0?distro=trixie
purl pkg:deb/debian/netpbm-free@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:10.97.00-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.97.00-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.97.00-1%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
6
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2017-2580
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tuqm-jg2y-zqak
17
url VCID-u4te-rujr-x7ek
vulnerability_id VCID-u4te-rujr-x7ek
summary security flaw
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2471.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2471.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2471
reference_id
reference_type
scores
0
value 0.02055
scoring_system epss
scoring_elements 0.83916
published_at 2026-04-21T12:55:00Z
1
value 0.02055
scoring_system epss
scoring_elements 0.83817
published_at 2026-04-01T12:55:00Z
2
value 0.02055
scoring_system epss
scoring_elements 0.8383
published_at 2026-04-02T12:55:00Z
3
value 0.02055
scoring_system epss
scoring_elements 0.83845
published_at 2026-04-04T12:55:00Z
4
value 0.02055
scoring_system epss
scoring_elements 0.83847
published_at 2026-04-07T12:55:00Z
5
value 0.02055
scoring_system epss
scoring_elements 0.83871
published_at 2026-04-08T12:55:00Z
6
value 0.02055
scoring_system epss
scoring_elements 0.83877
published_at 2026-04-09T12:55:00Z
7
value 0.02055
scoring_system epss
scoring_elements 0.83893
published_at 2026-04-11T12:55:00Z
8
value 0.02055
scoring_system epss
scoring_elements 0.83887
published_at 2026-04-12T12:55:00Z
9
value 0.02055
scoring_system epss
scoring_elements 0.83883
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2471
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2471
4
reference_url http://secunia.com/advisories/16184
reference_id
reference_type
scores
url http://secunia.com/advisories/16184
5
reference_url http://secunia.com/advisories/18330
reference_id
reference_type
scores
url http://secunia.com/advisories/18330
6
reference_url http://secunia.com/advisories/19436
reference_id
reference_type
scores
url http://secunia.com/advisories/19436
7
reference_url http://securitytracker.com/id?1014752
reference_id
reference_type
scores
url http://securitytracker.com/id?1014752
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/21500
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/21500
9
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11645
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11645
10
reference_url http://www.debian.org/security/2006/dsa-1021
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1021
11
reference_url http://www.novell.com/linux/security/advisories/2005_19_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_19_sr.html
12
reference_url http://www.osvdb.org/18253
reference_id
reference_type
scores
url http://www.osvdb.org/18253
13
reference_url http://www.redhat.com/support/errata/RHSA-2005-743.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-743.html
14
reference_url http://www.securityfocus.com/bid/14379
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/14379
15
reference_url http://www.trustix.org/errata/2005/0038/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0038/
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617722
reference_id 1617722
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617722
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757
reference_id 319757
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:2.10.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:2.10.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:2.10.0.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2471
reference_id CVE-2005-2471
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2471
20
reference_url https://access.redhat.com/errata/RHSA-2005:743
reference_id RHSA-2005:743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:743
21
reference_url https://usn.ubuntu.com/164-1/
reference_id USN-164-1
reference_type
scores
url https://usn.ubuntu.com/164-1/
fixed_packages
0
url pkg:deb/debian/netpbm-free@2:10.0-9?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-9%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2005-2471
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u4te-rujr-x7ek
18
url VCID-zezh-euwy-9ka7
vulnerability_id VCID-zezh-euwy-9ka7
summary netpbm: Null pointer dereference in stringToUint function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2586.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2586
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.30377
published_at 2026-04-01T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30406
published_at 2026-04-02T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30451
published_at 2026-04-04T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30259
published_at 2026-04-07T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30319
published_at 2026-04-08T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30353
published_at 2026-04-09T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30356
published_at 2026-04-11T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30312
published_at 2026-04-12T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30265
published_at 2026-04-13T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30279
published_at 2026-04-16T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30261
published_at 2026-04-18T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30217
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2586
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1419539
reference_id 1419539
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1419539
fixed_packages
0
url pkg:deb/debian/netpbm-free@0?distro=trixie
purl pkg:deb/debian/netpbm-free@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie
1
url pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
purl pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie
2
url pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie
3
url pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie
4
url pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie
5
url pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
purl pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie
aliases CVE-2017-2586
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zezh-euwy-9ka7
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie