Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-kym4-etgv-u3bv
Summary
libwmf bundles an old GD version which contains a "use-after-free"
    vulnerability.
Aliases
0
alias CVE-2009-1364
Fixed_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-14
purl pkg:alpm/archlinux/libwmf@0.2.8.4-14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14
1
url pkg:deb/debian/libwmf@0.2.8.4-6.1
purl pkg:deb/debian/libwmf@0.2.8.4-6.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-6.1
2
url pkg:deb/debian/libwmf@0.2.8.4-6.1?distro=trixie
purl pkg:deb/debian/libwmf@0.2.8.4-6.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-6.1%3Fdistro=trixie
3
url pkg:deb/debian/libwmf@0.2.8.4-17?distro=trixie
purl pkg:deb/debian/libwmf@0.2.8.4-17?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-17%3Fdistro=trixie
4
url pkg:deb/debian/libwmf@0.2.12-5.1?distro=trixie
purl pkg:deb/debian/libwmf@0.2.12-5.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.12-5.1%3Fdistro=trixie
5
url pkg:deb/debian/libwmf@0.2.13-1.1?distro=trixie
purl pkg:deb/debian/libwmf@0.2.13-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.13-1.1%3Fdistro=trixie
6
url pkg:deb/debian/libwmf@0.2.14-1?distro=trixie
purl pkg:deb/debian/libwmf@0.2.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.14-1%3Fdistro=trixie
7
url pkg:ebuild/media-libs/libwmf@0.2.8.4-r3
purl pkg:ebuild/media-libs/libwmf@0.2.8.4-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/libwmf@0.2.8.4-r3
Affected_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-13
purl pkg:alpm/archlinux/libwmf@0.2.8.4-13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4ehv-84qa-fubx
1
vulnerability VCID-5qdc-jjh5-gfba
2
vulnerability VCID-5we4-7e6c-7bb6
3
vulnerability VCID-7d1e-wnq6-4qfr
4
vulnerability VCID-9fnx-1dty-4yg9
5
vulnerability VCID-busj-qfth-v7e3
6
vulnerability VCID-ek5b-jujn-bqet
7
vulnerability VCID-evjq-akma-sfhf
8
vulnerability VCID-j15c-u5ty-jug1
9
vulnerability VCID-kym4-etgv-u3bv
10
vulnerability VCID-tttf-2akk-57ez
11
vulnerability VCID-v3cm-pjc9-6bhq
12
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-13
1
url pkg:deb/debian/libwmf@0.1.16-2
purl pkg:deb/debian/libwmf@0.1.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-kym4-etgv-u3bv
5
vulnerability VCID-v3cm-pjc9-6bhq
6
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.1.16-2
2
url pkg:deb/debian/libwmf@0.2.2-4
purl pkg:deb/debian/libwmf@0.2.2-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-kym4-etgv-u3bv
5
vulnerability VCID-v3cm-pjc9-6bhq
6
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.2-4
3
url pkg:deb/debian/libwmf@0.2.8.3-2sarge1
purl pkg:deb/debian/libwmf@0.2.8.3-2sarge1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-kym4-etgv-u3bv
5
vulnerability VCID-v3cm-pjc9-6bhq
6
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.3-2sarge1
4
url pkg:deb/debian/libwmf@0.2.8.4-2
purl pkg:deb/debian/libwmf@0.2.8.4-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-kym4-etgv-u3bv
5
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-2
5
url pkg:deb/debian/libwmf@0.2.8.4-2%2Betch1
purl pkg:deb/debian/libwmf@0.2.8.4-2%2Betch1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-kym4-etgv-u3bv
5
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-2%252Betch1
6
url pkg:deb/debian/libwmf@0.2.8.4-6%2Blenny1
purl pkg:deb/debian/libwmf@0.2.8.4-6%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-kym4-etgv-u3bv
5
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-6%252Blenny1
7
url pkg:rpm/redhat/libwmf@0.2.8.3-5?arch=8
purl pkg:rpm/redhat/libwmf@0.2.8.3-5?arch=8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kym4-etgv-u3bv
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libwmf@0.2.8.3-5%3Farch=8
8
url pkg:rpm/redhat/libwmf@0.2.8.4-10?arch=2
purl pkg:rpm/redhat/libwmf@0.2.8.4-10?arch=2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kym4-etgv-u3bv
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libwmf@0.2.8.4-10%3Farch=2
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1364.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1364.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1364
reference_id
reference_type
scores
0
value 0.03145
scoring_system epss
scoring_elements 0.86907
published_at 2026-04-21T12:55:00Z
1
value 0.03145
scoring_system epss
scoring_elements 0.8683
published_at 2026-04-01T12:55:00Z
2
value 0.03145
scoring_system epss
scoring_elements 0.8684
published_at 2026-04-02T12:55:00Z
3
value 0.03145
scoring_system epss
scoring_elements 0.8686
published_at 2026-04-04T12:55:00Z
4
value 0.03145
scoring_system epss
scoring_elements 0.86854
published_at 2026-04-07T12:55:00Z
5
value 0.03145
scoring_system epss
scoring_elements 0.86874
published_at 2026-04-08T12:55:00Z
6
value 0.03145
scoring_system epss
scoring_elements 0.86882
published_at 2026-04-09T12:55:00Z
7
value 0.03145
scoring_system epss
scoring_elements 0.86895
published_at 2026-04-11T12:55:00Z
8
value 0.03145
scoring_system epss
scoring_elements 0.8689
published_at 2026-04-12T12:55:00Z
9
value 0.03145
scoring_system epss
scoring_elements 0.86885
published_at 2026-04-13T12:55:00Z
10
value 0.03145
scoring_system epss
scoring_elements 0.86902
published_at 2026-04-16T12:55:00Z
11
value 0.03145
scoring_system epss
scoring_elements 0.86908
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1364
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496864
reference_id 496864
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496864
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526434
reference_id 526434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526434
5
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
6
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
7
reference_url https://security.gentoo.org/glsa/200907-01
reference_id GLSA-200907-01
reference_type
scores
url https://security.gentoo.org/glsa/200907-01
8
reference_url https://access.redhat.com/errata/RHSA-2009:0457
reference_id RHSA-2009:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0457
9
reference_url https://usn.ubuntu.com/769-1/
reference_id USN-769-1
reference_type
scores
url https://usn.ubuntu.com/769-1/
Weaknesses
0
cwe_id 416
name Use After Free
description Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Exploits
Severity_range_score9.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-kym4-etgv-u3bv