Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/netpbm-free@2:9.20-8.4
Typedeb
Namespacedebian
Namenetpbm-free
Version2:9.20-8.4
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2:10.0-12.2
Latest_non_vulnerable_version2:10.0-12.2
Affected_by_vulnerabilities
0
url VCID-6379-1fut-nbhm
vulnerability_id VCID-6379-1fut-nbhm
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0146.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0146.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0146
reference_id
reference_type
scores
0
value 0.03882
scoring_system epss
scoring_elements 0.88188
published_at 2026-04-01T12:55:00Z
1
value 0.03882
scoring_system epss
scoring_elements 0.88196
published_at 2026-04-02T12:55:00Z
2
value 0.03882
scoring_system epss
scoring_elements 0.88212
published_at 2026-04-04T12:55:00Z
3
value 0.03882
scoring_system epss
scoring_elements 0.88218
published_at 2026-04-07T12:55:00Z
4
value 0.03882
scoring_system epss
scoring_elements 0.88237
published_at 2026-04-08T12:55:00Z
5
value 0.03882
scoring_system epss
scoring_elements 0.88243
published_at 2026-04-09T12:55:00Z
6
value 0.03882
scoring_system epss
scoring_elements 0.88255
published_at 2026-04-11T12:55:00Z
7
value 0.03882
scoring_system epss
scoring_elements 0.88247
published_at 2026-04-13T12:55:00Z
8
value 0.03882
scoring_system epss
scoring_elements 0.88261
published_at 2026-04-16T12:55:00Z
9
value 0.03882
scoring_system epss
scoring_elements 0.8826
published_at 2026-04-18T12:55:00Z
10
value 0.03882
scoring_system epss
scoring_elements 0.88259
published_at 2026-04-21T12:55:00Z
11
value 0.03882
scoring_system epss
scoring_elements 0.88277
published_at 2026-04-24T12:55:00Z
12
value 0.03882
scoring_system epss
scoring_elements 0.88282
published_at 2026-04-26T12:55:00Z
13
value 0.03882
scoring_system epss
scoring_elements 0.88284
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0146
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0146
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616985
reference_id 1616985
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616985
4
reference_url https://access.redhat.com/errata/RHSA-2003:060
reference_id RHSA-2003:060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:060
5
reference_url https://access.redhat.com/errata/RHSA-2003:061
reference_id RHSA-2003:061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:061
fixed_packages
0
url pkg:deb/debian/netpbm-free@2:10.0-8sarge3
purl pkg:deb/debian/netpbm-free@2:10.0-8sarge3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8hkk-cuf8-c3fp
1
vulnerability VCID-mbac-cudj-wfaj
2
vulnerability VCID-qa1v-juda-mbgv
3
vulnerability VCID-qyx6-j4fm-cbc9
4
vulnerability VCID-u4te-rujr-x7ek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-8sarge3
aliases CVE-2003-0146
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6379-1fut-nbhm
1
url VCID-8hkk-cuf8-c3fp
vulnerability_id VCID-8hkk-cuf8-c3fp
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3632.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3632
reference_id
reference_type
scores
0
value 0.00245
scoring_system epss
scoring_elements 0.4773
published_at 2026-04-29T12:55:00Z
1
value 0.00245
scoring_system epss
scoring_elements 0.47722
published_at 2026-04-01T12:55:00Z
2
value 0.00245
scoring_system epss
scoring_elements 0.4776
published_at 2026-04-02T12:55:00Z
3
value 0.00245
scoring_system epss
scoring_elements 0.47779
published_at 2026-04-12T12:55:00Z
4
value 0.00245
scoring_system epss
scoring_elements 0.47728
published_at 2026-04-07T12:55:00Z
5
value 0.00245
scoring_system epss
scoring_elements 0.47783
published_at 2026-04-26T12:55:00Z
6
value 0.00245
scoring_system epss
scoring_elements 0.47803
published_at 2026-04-11T12:55:00Z
7
value 0.00245
scoring_system epss
scoring_elements 0.47789
published_at 2026-04-13T12:55:00Z
8
value 0.00245
scoring_system epss
scoring_elements 0.47844
published_at 2026-04-16T12:55:00Z
9
value 0.00245
scoring_system epss
scoring_elements 0.47837
published_at 2026-04-18T12:55:00Z
10
value 0.00245
scoring_system epss
scoring_elements 0.4779
published_at 2026-04-21T12:55:00Z
11
value 0.00245
scoring_system epss
scoring_elements 0.47773
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3632
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3632
3
reference_url http://secunia.com/advisories/17544
reference_id
reference_type
scores
url http://secunia.com/advisories/17544
4
reference_url http://secunia.com/advisories/17671
reference_id
reference_type
scores
url http://secunia.com/advisories/17671
5
reference_url http://secunia.com/advisories/17679
reference_id
reference_type
scores
url http://secunia.com/advisories/17679
6
reference_url http://secunia.com/advisories/17828
reference_id
reference_type
scores
url http://secunia.com/advisories/17828
7
reference_url http://secunia.com/advisories/18186
reference_id
reference_type
scores
url http://secunia.com/advisories/18186
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11165
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11165
9
reference_url http://www.debian.org/security/2005/dsa-904
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-904
10
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:217
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:217
11
reference_url http://www.novell.com/linux/security/advisories/2005_28_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_28_sr.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2005-843.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-843.html
13
reference_url http://www.securityfocus.com/bid/15514
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15514
14
reference_url http://www.vupen.com/english/advisories/2005/2418
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2418
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617833
reference_id 1617833
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617833
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639
reference_id 351639
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3632
reference_id CVE-2005-3632
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3632
25
reference_url https://access.redhat.com/errata/RHSA-2005:843
reference_id RHSA-2005:843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:843
26
reference_url https://usn.ubuntu.com/218-1/
reference_id USN-218-1
reference_type
scores
url https://usn.ubuntu.com/218-1/
fixed_packages
0
url pkg:deb/debian/netpbm-free@2:10.0-11
purl pkg:deb/debian/netpbm-free@2:10.0-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mbac-cudj-wfaj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-11
aliases CVE-2005-3632
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8hkk-cuf8-c3fp
2
url VCID-mbac-cudj-wfaj
vulnerability_id VCID-mbac-cudj-wfaj
summary
A vulnerability in Netpbm could result in execution of arbitrary
    code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4274.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4274.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-4274
reference_id
reference_type
scores
0
value 0.02543
scoring_system epss
scoring_elements 0.85523
published_at 2026-04-29T12:55:00Z
1
value 0.02543
scoring_system epss
scoring_elements 0.85471
published_at 2026-04-12T12:55:00Z
2
value 0.02543
scoring_system epss
scoring_elements 0.85467
published_at 2026-04-13T12:55:00Z
3
value 0.02543
scoring_system epss
scoring_elements 0.85491
published_at 2026-04-16T12:55:00Z
4
value 0.02543
scoring_system epss
scoring_elements 0.85495
published_at 2026-04-18T12:55:00Z
5
value 0.02543
scoring_system epss
scoring_elements 0.85492
published_at 2026-04-21T12:55:00Z
6
value 0.02543
scoring_system epss
scoring_elements 0.85515
published_at 2026-04-24T12:55:00Z
7
value 0.02543
scoring_system epss
scoring_elements 0.85524
published_at 2026-04-26T12:55:00Z
8
value 0.02611
scoring_system epss
scoring_elements 0.85581
published_at 2026-04-02T12:55:00Z
9
value 0.02611
scoring_system epss
scoring_elements 0.85598
published_at 2026-04-04T12:55:00Z
10
value 0.02611
scoring_system epss
scoring_elements 0.85604
published_at 2026-04-07T12:55:00Z
11
value 0.02611
scoring_system epss
scoring_elements 0.85624
published_at 2026-04-08T12:55:00Z
12
value 0.02611
scoring_system epss
scoring_elements 0.85635
published_at 2026-04-09T12:55:00Z
13
value 0.02611
scoring_system epss
scoring_elements 0.8565
published_at 2026-04-11T12:55:00Z
14
value 0.02611
scoring_system epss
scoring_elements 0.85569
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-4274
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4274
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=546580
reference_id 546580
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=546580
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569060
reference_id 569060
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569060
5
reference_url https://security.gentoo.org/glsa/201311-08
reference_id GLSA-201311-08
reference_type
scores
url https://security.gentoo.org/glsa/201311-08
6
reference_url https://access.redhat.com/errata/RHSA-2011:1811
reference_id RHSA-2011:1811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1811
7
reference_url https://usn.ubuntu.com/934-1/
reference_id USN-934-1
reference_type
scores
url https://usn.ubuntu.com/934-1/
fixed_packages
0
url pkg:deb/debian/netpbm-free@2:10.0-12.2
purl pkg:deb/debian/netpbm-free@2:10.0-12.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-12.2
aliases CVE-2009-4274
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mbac-cudj-wfaj
3
url VCID-qa1v-juda-mbgv
vulnerability_id VCID-qa1v-juda-mbgv
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2978.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2978.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2978
reference_id
reference_type
scores
0
value 0.04583
scoring_system epss
scoring_elements 0.89256
published_at 2026-04-29T12:55:00Z
1
value 0.04583
scoring_system epss
scoring_elements 0.89174
published_at 2026-04-01T12:55:00Z
2
value 0.04583
scoring_system epss
scoring_elements 0.8918
published_at 2026-04-02T12:55:00Z
3
value 0.04583
scoring_system epss
scoring_elements 0.89194
published_at 2026-04-04T12:55:00Z
4
value 0.04583
scoring_system epss
scoring_elements 0.89197
published_at 2026-04-07T12:55:00Z
5
value 0.04583
scoring_system epss
scoring_elements 0.89215
published_at 2026-04-08T12:55:00Z
6
value 0.04583
scoring_system epss
scoring_elements 0.89219
published_at 2026-04-09T12:55:00Z
7
value 0.04583
scoring_system epss
scoring_elements 0.89229
published_at 2026-04-11T12:55:00Z
8
value 0.04583
scoring_system epss
scoring_elements 0.89225
published_at 2026-04-12T12:55:00Z
9
value 0.04583
scoring_system epss
scoring_elements 0.89222
published_at 2026-04-13T12:55:00Z
10
value 0.04583
scoring_system epss
scoring_elements 0.89234
published_at 2026-04-18T12:55:00Z
11
value 0.04583
scoring_system epss
scoring_elements 0.8923
published_at 2026-04-21T12:55:00Z
12
value 0.04583
scoring_system epss
scoring_elements 0.89247
published_at 2026-04-24T12:55:00Z
13
value 0.04583
scoring_system epss
scoring_elements 0.89252
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2978
2
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2978
4
reference_url http://secunia.com/advisories/17221
reference_id
reference_type
scores
url http://secunia.com/advisories/17221
5
reference_url http://secunia.com/advisories/17222
reference_id
reference_type
scores
url http://secunia.com/advisories/17222
6
reference_url http://secunia.com/advisories/17256
reference_id
reference_type
scores
url http://secunia.com/advisories/17256
7
reference_url http://secunia.com/advisories/17265
reference_id
reference_type
scores
url http://secunia.com/advisories/17265
8
reference_url http://secunia.com/advisories/17282
reference_id
reference_type
scores
url http://secunia.com/advisories/17282
9
reference_url http://secunia.com/advisories/17357
reference_id
reference_type
scores
url http://secunia.com/advisories/17357
10
reference_url http://securitytracker.com/id?1015071
reference_id
reference_type
scores
url http://securitytracker.com/id?1015071
11
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135
12
reference_url http://www.debian.org/security/2005/dsa-878
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-878
13
reference_url http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml
14
reference_url http://www.novell.com/linux/security/advisories/2005_24_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_24_sr.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2005-793.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-793.html
16
reference_url http://www.securityfocus.com/bid/15128
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15128
17
reference_url http://www.vupen.com/english/advisories/2005/2133
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2133
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617774
reference_id 1617774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617774
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2978
reference_id CVE-2005-2978
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2978
45
reference_url https://access.redhat.com/errata/RHSA-2005:793
reference_id RHSA-2005:793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:793
46
reference_url https://usn.ubuntu.com/210-1/
reference_id USN-210-1
reference_type
scores
url https://usn.ubuntu.com/210-1/
fixed_packages
0
url pkg:deb/debian/netpbm-free@2:10.0-11
purl pkg:deb/debian/netpbm-free@2:10.0-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mbac-cudj-wfaj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-11
aliases CVE-2005-2978
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qa1v-juda-mbgv
4
url VCID-qyx6-j4fm-cbc9
vulnerability_id VCID-qyx6-j4fm-cbc9
summary security flaw
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3662.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3662.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3662
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51268
published_at 2026-04-29T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51225
published_at 2026-04-01T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51277
published_at 2026-04-02T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51302
published_at 2026-04-04T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51261
published_at 2026-04-07T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51316
published_at 2026-04-08T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51313
published_at 2026-04-09T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51357
published_at 2026-04-11T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51336
published_at 2026-04-12T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51322
published_at 2026-04-13T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51364
published_at 2026-04-16T12:55:00Z
11
value 0.00279
scoring_system epss
scoring_elements 0.51372
published_at 2026-04-18T12:55:00Z
12
value 0.00279
scoring_system epss
scoring_elements 0.51352
published_at 2026-04-21T12:55:00Z
13
value 0.00279
scoring_system epss
scoring_elements 0.51299
published_at 2026-04-24T12:55:00Z
14
value 0.00279
scoring_system epss
scoring_elements 0.51306
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3662
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3662
4
reference_url http://secunia.com/advisories/17544
reference_id
reference_type
scores
url http://secunia.com/advisories/17544
5
reference_url http://secunia.com/advisories/17671
reference_id
reference_type
scores
url http://secunia.com/advisories/17671
6
reference_url http://secunia.com/advisories/17679
reference_id
reference_type
scores
url http://secunia.com/advisories/17679
7
reference_url http://secunia.com/advisories/17828
reference_id
reference_type
scores
url http://secunia.com/advisories/17828
8
reference_url http://secunia.com/advisories/18186
reference_id
reference_type
scores
url http://secunia.com/advisories/18186
9
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
10
reference_url http://sourceforge.net/project/shownotes.php?release_id=370545
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=370545
11
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9583
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9583
12
reference_url http://www.debian.org/security/2005/dsa-904
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-904
13
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:217
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:217
14
reference_url http://www.novell.com/linux/security/advisories/2005_28_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_28_sr.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2005-843.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-843.html
16
reference_url http://www.securityfocus.com/bid/15427
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15427
17
reference_url http://www.vupen.com/english/advisories/2005/2418
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2418
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617836
reference_id 1617836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617836
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639
reference_id 351639
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:greg_roelofs:pnmtopng:2.37.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:greg_roelofs:pnmtopng:2.37.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:greg_roelofs:pnmtopng:2.37.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:greg_roelofs:pnmtopng:2.37.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.38:*:*:*:*:*:*:*
reference_id cpe:2.3:a:greg_roelofs:pnmtopng:2.38:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.38:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3662
reference_id CVE-2005-3662
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3662
26
reference_url https://access.redhat.com/errata/RHSA-2005:843
reference_id RHSA-2005:843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:843
27
reference_url https://usn.ubuntu.com/218-1/
reference_id USN-218-1
reference_type
scores
url https://usn.ubuntu.com/218-1/
fixed_packages
0
url pkg:deb/debian/netpbm-free@2:10.0-11
purl pkg:deb/debian/netpbm-free@2:10.0-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mbac-cudj-wfaj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-11
aliases CVE-2005-3662
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qyx6-j4fm-cbc9
5
url VCID-rqj6-vs48-ufbd
vulnerability_id VCID-rqj6-vs48-ufbd
summary
Utilities included in old Netpbm versions are vulnerable to multiple
    temporary files issues, potentially allowing a local attacker to overwrite
    files with the rights of the user running the utility.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0924.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0924.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0924
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27646
published_at 2026-04-01T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27686
published_at 2026-04-02T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27724
published_at 2026-04-04T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27514
published_at 2026-04-07T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27582
published_at 2026-04-08T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27625
published_at 2026-04-09T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.2763
published_at 2026-04-11T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27586
published_at 2026-04-12T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27529
published_at 2026-04-13T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27538
published_at 2026-04-16T12:55:00Z
10
value 0.00099
scoring_system epss
scoring_elements 0.2751
published_at 2026-04-18T12:55:00Z
11
value 0.00099
scoring_system epss
scoring_elements 0.27472
published_at 2026-04-21T12:55:00Z
12
value 0.00099
scoring_system epss
scoring_elements 0.27425
published_at 2026-04-24T12:55:00Z
13
value 0.00099
scoring_system epss
scoring_elements 0.2732
published_at 2026-04-26T12:55:00Z
14
value 0.00099
scoring_system epss
scoring_elements 0.27244
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0924
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617099
reference_id 1617099
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617099
4
reference_url https://security.gentoo.org/glsa/200410-02
reference_id GLSA-200410-02
reference_type
scores
url https://security.gentoo.org/glsa/200410-02
5
reference_url https://access.redhat.com/errata/RHSA-2004:030
reference_id RHSA-2004:030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:030
6
reference_url https://access.redhat.com/errata/RHSA-2004:031
reference_id RHSA-2004:031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:031
fixed_packages
0
url pkg:deb/debian/netpbm-free@2:10.0-8sarge3
purl pkg:deb/debian/netpbm-free@2:10.0-8sarge3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8hkk-cuf8-c3fp
1
vulnerability VCID-mbac-cudj-wfaj
2
vulnerability VCID-qa1v-juda-mbgv
3
vulnerability VCID-qyx6-j4fm-cbc9
4
vulnerability VCID-u4te-rujr-x7ek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-8sarge3
aliases CVE-2003-0924
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rqj6-vs48-ufbd
6
url VCID-u4te-rujr-x7ek
vulnerability_id VCID-u4te-rujr-x7ek
summary security flaw
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2471.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2471.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2471
reference_id
reference_type
scores
0
value 0.02055
scoring_system epss
scoring_elements 0.83954
published_at 2026-04-29T12:55:00Z
1
value 0.02055
scoring_system epss
scoring_elements 0.83817
published_at 2026-04-01T12:55:00Z
2
value 0.02055
scoring_system epss
scoring_elements 0.8383
published_at 2026-04-02T12:55:00Z
3
value 0.02055
scoring_system epss
scoring_elements 0.83845
published_at 2026-04-04T12:55:00Z
4
value 0.02055
scoring_system epss
scoring_elements 0.83847
published_at 2026-04-07T12:55:00Z
5
value 0.02055
scoring_system epss
scoring_elements 0.83871
published_at 2026-04-08T12:55:00Z
6
value 0.02055
scoring_system epss
scoring_elements 0.83877
published_at 2026-04-09T12:55:00Z
7
value 0.02055
scoring_system epss
scoring_elements 0.83893
published_at 2026-04-11T12:55:00Z
8
value 0.02055
scoring_system epss
scoring_elements 0.83887
published_at 2026-04-12T12:55:00Z
9
value 0.02055
scoring_system epss
scoring_elements 0.83883
published_at 2026-04-13T12:55:00Z
10
value 0.02055
scoring_system epss
scoring_elements 0.83916
published_at 2026-04-21T12:55:00Z
11
value 0.02055
scoring_system epss
scoring_elements 0.83942
published_at 2026-04-24T12:55:00Z
12
value 0.02055
scoring_system epss
scoring_elements 0.8395
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2471
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2471
4
reference_url http://secunia.com/advisories/16184
reference_id
reference_type
scores
url http://secunia.com/advisories/16184
5
reference_url http://secunia.com/advisories/18330
reference_id
reference_type
scores
url http://secunia.com/advisories/18330
6
reference_url http://secunia.com/advisories/19436
reference_id
reference_type
scores
url http://secunia.com/advisories/19436
7
reference_url http://securitytracker.com/id?1014752
reference_id
reference_type
scores
url http://securitytracker.com/id?1014752
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/21500
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/21500
9
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11645
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11645
10
reference_url http://www.debian.org/security/2006/dsa-1021
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1021
11
reference_url http://www.novell.com/linux/security/advisories/2005_19_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_19_sr.html
12
reference_url http://www.osvdb.org/18253
reference_id
reference_type
scores
url http://www.osvdb.org/18253
13
reference_url http://www.redhat.com/support/errata/RHSA-2005-743.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-743.html
14
reference_url http://www.securityfocus.com/bid/14379
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/14379
15
reference_url http://www.trustix.org/errata/2005/0038/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0038/
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617722
reference_id 1617722
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617722
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757
reference_id 319757
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:2.10.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netpbm:netpbm:2.10.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:2.10.0.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2471
reference_id CVE-2005-2471
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2471
20
reference_url https://access.redhat.com/errata/RHSA-2005:743
reference_id RHSA-2005:743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:743
21
reference_url https://usn.ubuntu.com/164-1/
reference_id USN-164-1
reference_type
scores
url https://usn.ubuntu.com/164-1/
fixed_packages
0
url pkg:deb/debian/netpbm-free@2:10.0-11
purl pkg:deb/debian/netpbm-free@2:10.0-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mbac-cudj-wfaj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-11
aliases CVE-2005-2471
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u4te-rujr-x7ek
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:9.20-8.4