{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48166?format=json","vulnerability_id":"VCID-egd1-scuw-vud1","summary":"There are several bugs in Qt's image-handling code which could lead to\n    crashes or arbitrary code execution.","aliases":[{"alias":"CVE-2004-0691"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77421?format=json","purl":"pkg:ebuild/x11-libs/qt@3.3.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/qt@3.3.3"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77420?format=json","purl":"pkg:ebuild/x11-libs/qt@3.3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9wp7-c9r1-cffw"},{"vulnerability":"VCID-egd1-scuw-vud1"},{"vulnerability":"VCID-zumt-58m3-afdq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/qt@3.3.2"},{"url":"http://public2.vulnerablecode.io/api/packages/130452?format=json","purl":"pkg:rpm/redhat/qt@1:3.1.2-13?arch=4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9wp7-c9r1-cffw"},{"vulnerability":"VCID-egd1-scuw-vud1"},{"vulnerability":"VCID-zumt-58m3-afdq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/qt@1:3.1.2-13%3Farch=4"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0691.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0691.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0691","reference_id":"","reference_type":"","scores":[{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96357","published_at":"2026-04-01T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96364","published_at":"2026-04-02T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96368","published_at":"2026-04-04T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.9638","published_at":"2026-04-08T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96384","published_at":"2026-04-09T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96391","published_at":"2026-04-13T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96398","published_at":"2026-04-16T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96402","published_at":"2026-04-18T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96404","published_at":"2026-04-21T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96405","published_at":"2026-04-24T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96406","published_at":"2026-04-26T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96407","published_at":"2026-04-29T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96416","published_at":"2026-05-05T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96419","published_at":"2026-05-07T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96425","published_at":"2026-05-09T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96428","published_at":"2026-05-11T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96433","published_at":"2026-05-12T12:55:00Z"},{"value":"0.27214","scoring_system":"epss","scoring_elements":"0.96443","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0691"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617252","reference_id":"1617252","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617252"},{"reference_url":"https://security.gentoo.org/glsa/200408-20","reference_id":"GLSA-200408-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200408-20"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/408.c","reference_id":"OSVDB-9026;CVE-2004-0691","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/408.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:414","reference_id":"RHSA-2004:414","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:414"}],"weaknesses":[],"exploits":[{"date_added":"2004-08-20","description":"Qt - '.bmp' Parsing Bug Heap Overflow","required_action":null,"due_date":null,"notes":null,"known_ransomware_campaign_use":true,"source_date_published":"2004-08-21","exploit_type":"remote","platform":"linux","source_date_updated":null,"data_source":"Exploit-DB","source_url":""}],"severity_range_score":null,"exploitability":"2.0","weighted_severity":"0.2","risk_score":0.4,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-egd1-scuw-vud1"}