Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-r1fr-2h37-bybw
Summarygnome-shell: Mishandling extensions that fail to reload
Aliases
0
alias CVE-2017-8288
Fixed_packages
0
url pkg:deb/debian/gnome-shell@3.22.3-3
purl pkg:deb/debian/gnome-shell@3.22.3-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hgy-yca4-9qfw
1
vulnerability VCID-8za5-vf91-4ke3
2
vulnerability VCID-ug27-xpfs-mye2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.22.3-3
1
url pkg:deb/debian/gnome-shell@3.22.3-3?distro=trixie
purl pkg:deb/debian/gnome-shell@3.22.3-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.22.3-3%3Fdistro=trixie
2
url pkg:deb/debian/gnome-shell@3.38.6-1~deb11u2?distro=trixie
purl pkg:deb/debian/gnome-shell@3.38.6-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nq2k-cj2q-g7dc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.38.6-1~deb11u2%3Fdistro=trixie
3
url pkg:deb/debian/gnome-shell@43.9-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/gnome-shell@43.9-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nq2k-cj2q-g7dc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@43.9-0%252Bdeb12u2%3Fdistro=trixie
4
url pkg:deb/debian/gnome-shell@48.7-0%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnome-shell@48.7-0%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@48.7-0%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/gnome-shell@49.5-1?distro=trixie
purl pkg:deb/debian/gnome-shell@49.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@49.5-1%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/gnome-shell@3.4.2-7%2Bdeb7u2
purl pkg:deb/debian/gnome-shell@3.4.2-7%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hgy-yca4-9qfw
1
vulnerability VCID-8za5-vf91-4ke3
2
vulnerability VCID-kjwz-sagx-zyg3
3
vulnerability VCID-kncq-w5uj-yugf
4
vulnerability VCID-r1fr-2h37-bybw
5
vulnerability VCID-ug27-xpfs-mye2
6
vulnerability VCID-xb57-82md-nqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.4.2-7%252Bdeb7u2
1
url pkg:deb/debian/gnome-shell@3.14.2-3
purl pkg:deb/debian/gnome-shell@3.14.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hgy-yca4-9qfw
1
vulnerability VCID-8za5-vf91-4ke3
2
vulnerability VCID-r1fr-2h37-bybw
3
vulnerability VCID-ug27-xpfs-mye2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.14.2-3
2
url pkg:deb/debian/gnome-shell@3.14.4-1~deb8u1
purl pkg:deb/debian/gnome-shell@3.14.4-1~deb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hgy-yca4-9qfw
1
vulnerability VCID-8za5-vf91-4ke3
2
vulnerability VCID-r1fr-2h37-bybw
3
vulnerability VCID-ug27-xpfs-mye2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.14.4-1~deb8u1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8288.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8288.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8288
reference_id
reference_type
scores
0
value 0.00309
scoring_system epss
scoring_elements 0.53984
published_at 2026-04-01T12:55:00Z
1
value 0.00309
scoring_system epss
scoring_elements 0.54091
published_at 2026-04-21T12:55:00Z
2
value 0.00309
scoring_system epss
scoring_elements 0.54066
published_at 2026-04-13T12:55:00Z
3
value 0.00309
scoring_system epss
scoring_elements 0.54105
published_at 2026-04-16T12:55:00Z
4
value 0.00309
scoring_system epss
scoring_elements 0.54109
published_at 2026-04-18T12:55:00Z
5
value 0.00309
scoring_system epss
scoring_elements 0.54002
published_at 2026-04-02T12:55:00Z
6
value 0.00309
scoring_system epss
scoring_elements 0.54028
published_at 2026-04-04T12:55:00Z
7
value 0.00309
scoring_system epss
scoring_elements 0.54004
published_at 2026-04-07T12:55:00Z
8
value 0.00309
scoring_system epss
scoring_elements 0.54056
published_at 2026-04-08T12:55:00Z
9
value 0.00309
scoring_system epss
scoring_elements 0.54055
published_at 2026-04-09T12:55:00Z
10
value 0.00309
scoring_system epss
scoring_elements 0.54102
published_at 2026-04-11T12:55:00Z
11
value 0.00309
scoring_system epss
scoring_elements 0.54084
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8288
2
reference_url https://bugs.kali.org/view.php?id=2513
reference_id
reference_type
scores
url https://bugs.kali.org/view.php?id=2513
3
reference_url https://bugzilla.gnome.org/show_bug.cgi?id=781728
reference_id
reference_type
scores
url https://bugzilla.gnome.org/show_bug.cgi?id=781728
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8288
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/EasyScreenCast/EasyScreenCast/issues/46
reference_id
reference_type
scores
url https://github.com/EasyScreenCast/EasyScreenCast/issues/46
7
reference_url https://github.com/GNOME/gnome-shell/commit/ff425d1db7082e2755d2a405af53861552acf2a1
reference_id
reference_type
scores
url https://github.com/GNOME/gnome-shell/commit/ff425d1db7082e2755d2a405af53861552acf2a1
8
reference_url http://www.securityfocus.com/bid/98070
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/98070
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446088
reference_id 1446088
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446088
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.22.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.22.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.22.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.23.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.23.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.23.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.90:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.23.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.91:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.23.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.92:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.24.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.24.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8288
reference_id CVE-2017-8288
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8288
23
reference_url https://usn.ubuntu.com/7052-1/
reference_id USN-7052-1
reference_type
scores
url https://usn.ubuntu.com/7052-1/
Weaknesses
0
cwe_id 248
name Uncaught Exception
description An exception is thrown from a function, but it is not caught.
1
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score4.3 - 8.1
Exploitability0.5
Weighted_severity7.3
Risk_score3.6
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-r1fr-2h37-bybw