{"url":"http://public2.vulnerablecode.io/api/packages/922913?format=json","purl":"pkg:deb/debian/gdk-pixbuf@0.22.0-11?distro=trixie","type":"deb","namespace":"debian","name":"gdk-pixbuf","version":"0.22.0-11","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.23.3-3.1","latest_non_vulnerable_version":"2.44.6+dfsg-2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51460?format=json","vulnerability_id":"VCID-1jyr-kac3-2ua2","summary":"The GdkPixbuf library, that is also included in GTK+ 2, contains\n    vulnerabilities that could lead to a Denial of Service or the execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2976.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2976.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2976","reference_id":"","reference_type":"","scores":[{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82485","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.8232","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82352","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82373","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.8238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82399","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82396","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.8239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82424","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82425","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82429","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82451","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82461","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01719","scoring_system":"epss","scoring_elements":"0.82466","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976"},{"reference_url":"http://secunia.com/advisories/17522","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17522"},{"reference_url":"http://secunia.com/advisories/17538","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17538"},{"reference_url":"http://secunia.com/advisories/17562","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17562"},{"reference_url":"http://secunia.com/advisories/17592","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17592"},{"reference_url":"http://secunia.com/advisories/17594","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17594"},{"reference_url":"http://secunia.com/advisories/17615","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17615"},{"reference_url":"http://secunia.com/advisories/17657","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17657"},{"reference_url":"http://secunia.com/advisories/17710","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17710"},{"reference_url":"http://secunia.com/advisories/17770","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17770"},{"reference_url":"http://secunia.com/advisories/17791","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17791"},{"reference_url":"http://securitytracker.com/id?1015216","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015216"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11370","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11370"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf"},{"reference_url":"http://www.debian.org/security/2005/dsa-911","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-911"},{"reference_url":"http://www.debian.org/security/2005/dsa-913","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-913"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:214","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:214"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_65_gtk2.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_65_gtk2.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-810.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-810.html"},{"reference_url":"http://www.securityfocus.com/archive/1/428052/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/428052/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/15428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15428"},{"reference_url":"http://www.ubuntu.com/usn/usn-216-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-216-1"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2433","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2433"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617772","reference_id":"1617772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617772"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431","reference_id":"339431","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2976","reference_id":"CVE-2005-2976","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2976"},{"reference_url":"https://security.gentoo.org/glsa/200511-14","reference_id":"GLSA-200511-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200511-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:810","reference_id":"RHSA-2005:810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:810"},{"reference_url":"https://usn.ubuntu.com/216-1/","reference_id":"USN-216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/216-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/922913?format=json","purl":"pkg:deb/debian/gdk-pixbuf@0.22.0-11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922907?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-xg6z-9vh5-pbd6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922905?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-xg6z-9vh5-pbd6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922910?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-xg6z-9vh5-pbd6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922908?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-xg6z-9vh5-pbd6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922909?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000438?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2005-2976"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1jyr-kac3-2ua2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51459?format=json","vulnerability_id":"VCID-3vjs-geuw-j7h7","summary":"The GdkPixbuf library, that is also included in GTK+ 2, contains\n    vulnerabilities that could lead to a Denial of Service or the execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2975.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2975.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2975","reference_id":"","reference_type":"","scores":[{"value":"0.1189","scoring_system":"epss","scoring_elements":"0.9378","published_at":"2026-05-05T12:55:00Z"},{"value":"0.1189","scoring_system":"epss","scoring_elements":"0.937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1189","scoring_system":"epss","scoring_elements":"0.9371","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1189","scoring_system":"epss","scoring_elements":"0.9372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1189","scoring_system":"epss","scoring_elements":"0.93723","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1189","scoring_system":"epss","scoring_elements":"0.93732","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1189","scoring_system":"epss","scoring_elements":"0.93734","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1189","scoring_system":"epss","scoring_elements":"0.93738","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1189","scoring_system":"epss","scoring_elements":"0.9376","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1189","scoring_system":"epss","scoring_elements":"0.93767","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1189","scoring_system":"epss","scoring_elements":"0.9377","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1189","scoring_system":"epss","scoring_elements":"0.93774","published_at":"2026-04-24T12:55:00Z"},{"value":"0.1189","scoring_system":"epss","scoring_elements":"0.93771","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975"},{"reference_url":"http://secunia.com/advisories/17522","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17522"},{"reference_url":"http://secunia.com/advisories/17538","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17538"},{"reference_url":"http://secunia.com/advisories/17562","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17562"},{"reference_url":"http://secunia.com/advisories/17588","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17588"},{"reference_url":"http://secunia.com/advisories/17591","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17591"},{"reference_url":"http://secunia.com/advisories/17592","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17592"},{"reference_url":"http://secunia.com/advisories/17594","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17594"},{"reference_url":"http://secunia.com/advisories/17615","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17615"},{"reference_url":"http://secunia.com/advisories/17657","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17657"},{"reference_url":"http://secunia.com/advisories/17710","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17710"},{"reference_url":"http://secunia.com/advisories/17770","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17770"},{"reference_url":"http://secunia.com/advisories/17791","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17791"},{"reference_url":"http://securitytracker.com/id?1015216","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015216"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9697","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9697"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf"},{"reference_url":"http://www.debian.org/security/2005/dsa-911","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-911"},{"reference_url":"http://www.debian.org/security/2005/dsa-913","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-913"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:214","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:214"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_65_gtk2.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_65_gtk2.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-810.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-810.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-811.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-811.html"},{"reference_url":"http://www.securityfocus.com/archive/1/428052/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/428052/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/15429","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15429"},{"reference_url":"http://www.ubuntu.com/usn/usn-216-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-216-1"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2433","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2433"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617771","reference_id":"1617771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617771"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431","reference_id":"339431","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2975","reference_id":"CVE-2005-2975","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2975"},{"reference_url":"https://security.gentoo.org/glsa/200511-14","reference_id":"GLSA-200511-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200511-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:810","reference_id":"RHSA-2005:810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:810"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:811","reference_id":"RHSA-2005:811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:811"},{"reference_url":"https://usn.ubuntu.com/216-1/","reference_id":"USN-216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/216-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/922913?format=json","purl":"pkg:deb/debian/gdk-pixbuf@0.22.0-11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922907?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-xg6z-9vh5-pbd6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922905?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-xg6z-9vh5-pbd6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922910?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-xg6z-9vh5-pbd6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922908?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-xg6z-9vh5-pbd6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922909?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000438?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2005-2975"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3vjs-geuw-j7h7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51461?format=json","vulnerability_id":"VCID-ecuv-xp49-5yeh","summary":"The GdkPixbuf library, that is also included in GTK+ 2, contains\n    vulnerabilities that could lead to a Denial of Service or the execution of\n    arbitrary code.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txt"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3186.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3186.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3186","reference_id":"","reference_type":"","scores":[{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84588","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84439","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84454","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84474","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84476","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84497","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84503","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84521","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84516","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84512","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84533","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84534","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84561","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84569","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02224","scoring_system":"epss","scoring_elements":"0.84572","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186"},{"reference_url":"http://secunia.com/advisories/17522","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17522"},{"reference_url":"http://secunia.com/advisories/17538","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17538"},{"reference_url":"http://secunia.com/advisories/17562","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17562"},{"reference_url":"http://secunia.com/advisories/17588","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17588"},{"reference_url":"http://secunia.com/advisories/17591","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17591"},{"reference_url":"http://secunia.com/advisories/17592","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17592"},{"reference_url":"http://secunia.com/advisories/17594","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17594"},{"reference_url":"http://secunia.com/advisories/17615","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17615"},{"reference_url":"http://secunia.com/advisories/17657","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17657"},{"reference_url":"http://secunia.com/advisories/17710","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17710"},{"reference_url":"http://secunia.com/advisories/17770","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17770"},{"reference_url":"http://secunia.com/advisories/17791","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17791"},{"reference_url":"http://secunia.com/advisories/18509","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18509"},{"reference_url":"http://securityreason.com/securityalert/188","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/188"},{"reference_url":"http://securitytracker.com/id?1015216","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015216"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf"},{"reference_url":"http://www.debian.org/security/2005/dsa-911","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-911"},{"reference_url":"http://www.debian.org/security/2005/dsa-913","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-913"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml"},{"reference_url":"http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:214","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:214"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_65_gtk2.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_65_gtk2.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-810.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-810.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-811.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-811.html"},{"reference_url":"http://www.securityfocus.com/archive/1/428052/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/428052/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/15435","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15435"},{"reference_url":"http://www.ubuntu.com/usn/usn-216-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-216-1"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2433","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2433"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617795","reference_id":"1617795","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617795"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431","reference_id":"339431","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gtk:gtk\\+:2.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gtk:gtk\\+:2.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gtk:gtk\\+:2.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3186","reference_id":"CVE-2005-3186","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3186"},{"reference_url":"https://security.gentoo.org/glsa/200511-14","reference_id":"GLSA-200511-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200511-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:810","reference_id":"RHSA-2005:810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:810"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:811","reference_id":"RHSA-2005:811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:811"},{"reference_url":"https://usn.ubuntu.com/216-1/","reference_id":"USN-216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/216-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/922913?format=json","purl":"pkg:deb/debian/gdk-pixbuf@0.22.0-11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922907?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-xg6z-9vh5-pbd6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922905?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-xg6z-9vh5-pbd6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922910?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-xg6z-9vh5-pbd6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922908?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-xg6z-9vh5-pbd6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922909?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000438?format=json","purl":"pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2005-3186"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ecuv-xp49-5yeh"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-11%3Fdistro=trixie"}