Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-kjwz-sagx-zyg3
Summarygnome-shell: lockscreen bypass with printscreen key
Aliases
0
alias CVE-2014-7300
Fixed_packages
0
url pkg:deb/debian/gnome-shell@3.14.1-1?distro=trixie
purl pkg:deb/debian/gnome-shell@3.14.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.14.1-1%3Fdistro=trixie
1
url pkg:deb/debian/gnome-shell@3.14.2-3
purl pkg:deb/debian/gnome-shell@3.14.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hgy-yca4-9qfw
1
vulnerability VCID-8za5-vf91-4ke3
2
vulnerability VCID-r1fr-2h37-bybw
3
vulnerability VCID-ug27-xpfs-mye2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.14.2-3
2
url pkg:deb/debian/gnome-shell@3.38.6-1~deb11u2?distro=trixie
purl pkg:deb/debian/gnome-shell@3.38.6-1~deb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nq2k-cj2q-g7dc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.38.6-1~deb11u2%3Fdistro=trixie
3
url pkg:deb/debian/gnome-shell@43.9-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/gnome-shell@43.9-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nq2k-cj2q-g7dc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@43.9-0%252Bdeb12u2%3Fdistro=trixie
4
url pkg:deb/debian/gnome-shell@48.7-0%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnome-shell@48.7-0%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@48.7-0%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/gnome-shell@49.5-1?distro=trixie
purl pkg:deb/debian/gnome-shell@49.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@49.5-1%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/gnome-shell@3.4.2-7%2Bdeb7u2
purl pkg:deb/debian/gnome-shell@3.4.2-7%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hgy-yca4-9qfw
1
vulnerability VCID-8za5-vf91-4ke3
2
vulnerability VCID-kjwz-sagx-zyg3
3
vulnerability VCID-kncq-w5uj-yugf
4
vulnerability VCID-r1fr-2h37-bybw
5
vulnerability VCID-ug27-xpfs-mye2
6
vulnerability VCID-xb57-82md-nqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.4.2-7%252Bdeb7u2
1
url pkg:rpm/redhat/clutter@1.14.4-12?arch=el7
purl pkg:rpm/redhat/clutter@1.14.4-12?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kjwz-sagx-zyg3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/clutter@1.14.4-12%3Farch=el7
2
url pkg:rpm/redhat/cogl@1.14.0-6?arch=el7
purl pkg:rpm/redhat/cogl@1.14.0-6?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kjwz-sagx-zyg3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cogl@1.14.0-6%3Farch=el7
3
url pkg:rpm/redhat/gnome-shell@3.8.4-45?arch=el7
purl pkg:rpm/redhat/gnome-shell@3.8.4-45?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kjwz-sagx-zyg3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gnome-shell@3.8.4-45%3Farch=el7
4
url pkg:rpm/redhat/mutter@3.8.4-16?arch=el7
purl pkg:rpm/redhat/mutter@3.8.4-16?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kjwz-sagx-zyg3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mutter@3.8.4-16%3Farch=el7
References
0
reference_url http://openwall.com/lists/oss-security/2014/09/29/17
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/09/29/17
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-0535.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0535.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7300.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7300.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-7300
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13475
published_at 2026-04-21T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13402
published_at 2026-04-18T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13517
published_at 2026-04-01T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13617
published_at 2026-04-02T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13678
published_at 2026-04-04T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13477
published_at 2026-04-07T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13558
published_at 2026-04-08T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13608
published_at 2026-04-09T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.1358
published_at 2026-04-11T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13542
published_at 2026-04-12T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13494
published_at 2026-04-13T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.13406
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-7300
4
reference_url https://bugzilla.gnome.org/show_bug.cgi?id=737456
reference_id
reference_type
scores
url https://bugzilla.gnome.org/show_bug.cgi?id=737456
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7300
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://git.gnome.org/browse/gnome-shell/commit/?id=a72dca361080ffc9f45ff90188a7cf013c3c4013
reference_id
reference_type
scores
url https://git.gnome.org/browse/gnome-shell/commit/?id=a72dca361080ffc9f45ff90188a7cf013c3c4013
8
reference_url https://git.gnome.org/browse/gnome-shell/commit/?id=f02b007337e61436aaa0e81a86ad707b6d277378
reference_id
reference_type
scores
url https://git.gnome.org/browse/gnome-shell/commit/?id=f02b007337e61436aaa0e81a86ad707b6d277378
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1147917
reference_id 1147917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1147917
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.14.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-7300
reference_id CVE-2014-7300
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-7300
16
reference_url https://access.redhat.com/errata/RHSA-2015:0535
reference_id RHSA-2015:0535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0535
Weaknesses
0
cwe_id 285
name Improper Authorization
description The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
1
cwe_id 770
name Allocation of Resources Without Limits or Throttling
description The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
2
cwe_id 305
name Authentication Bypass by Primary Weakness
description The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
3
cwe_id 399
name Resource Management Errors
description Weaknesses in this category are related to improper management of system resources.
Exploits
Severity_range_score4.6 - 7.2
Exploitability0.5
Weighted_severity6.5
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-kjwz-sagx-zyg3