Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libgd2@2.0.33-5.2
Typedeb
Namespacedebian
Namelibgd2
Version2.0.33-5.2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.3.3-9
Latest_non_vulnerable_version2.3.3-9
Affected_by_vulnerabilities
0
url VCID-1pj7-5gy9-97f7
vulnerability_id VCID-1pj7-5gy9-97f7
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10167.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10167.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10167
reference_id
reference_type
scores
0
value 0.00975
scoring_system epss
scoring_elements 0.76636
published_at 2026-04-01T12:55:00Z
1
value 0.00975
scoring_system epss
scoring_elements 0.76639
published_at 2026-04-02T12:55:00Z
2
value 0.00975
scoring_system epss
scoring_elements 0.76668
published_at 2026-04-04T12:55:00Z
3
value 0.00975
scoring_system epss
scoring_elements 0.76649
published_at 2026-04-07T12:55:00Z
4
value 0.00975
scoring_system epss
scoring_elements 0.76681
published_at 2026-04-08T12:55:00Z
5
value 0.00975
scoring_system epss
scoring_elements 0.76692
published_at 2026-04-13T12:55:00Z
6
value 0.00975
scoring_system epss
scoring_elements 0.7672
published_at 2026-04-11T12:55:00Z
7
value 0.00975
scoring_system epss
scoring_elements 0.767
published_at 2026-04-12T12:55:00Z
8
value 0.00975
scoring_system epss
scoring_elements 0.76734
published_at 2026-04-16T12:55:00Z
9
value 0.00975
scoring_system epss
scoring_elements 0.76739
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10167
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1418984
reference_id 1418984
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1418984
10
reference_url https://access.redhat.com/errata/RHSA-2017:3221
reference_id RHSA-2017:3221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3221
11
reference_url https://access.redhat.com/errata/RHSA-2018:1296
reference_id RHSA-2018:1296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1296
12
reference_url https://usn.ubuntu.com/3213-1/
reference_id USN-3213-1
reference_type
scores
url https://usn.ubuntu.com/3213-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-10167
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1pj7-5gy9-97f7
1
url VCID-34yj-pb2j-5faa
vulnerability_id VCID-34yj-pb2j-5faa
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5116.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5116.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5116
reference_id
reference_type
scores
0
value 0.02396
scoring_system epss
scoring_elements 0.85066
published_at 2026-04-18T12:55:00Z
1
value 0.02396
scoring_system epss
scoring_elements 0.84967
published_at 2026-04-01T12:55:00Z
2
value 0.02396
scoring_system epss
scoring_elements 0.84981
published_at 2026-04-02T12:55:00Z
3
value 0.02396
scoring_system epss
scoring_elements 0.84998
published_at 2026-04-04T12:55:00Z
4
value 0.02396
scoring_system epss
scoring_elements 0.85002
published_at 2026-04-07T12:55:00Z
5
value 0.02396
scoring_system epss
scoring_elements 0.85025
published_at 2026-04-08T12:55:00Z
6
value 0.02396
scoring_system epss
scoring_elements 0.85032
published_at 2026-04-09T12:55:00Z
7
value 0.02396
scoring_system epss
scoring_elements 0.85048
published_at 2026-04-11T12:55:00Z
8
value 0.02396
scoring_system epss
scoring_elements 0.85046
published_at 2026-04-12T12:55:00Z
9
value 0.02396
scoring_system epss
scoring_elements 0.85043
published_at 2026-04-13T12:55:00Z
10
value 0.02396
scoring_system epss
scoring_elements 0.85064
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5116
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1340856
reference_id 1340856
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1340856
11
reference_url https://usn.ubuntu.com/3030-1/
reference_id USN-3030-1
reference_type
scores
url https://usn.ubuntu.com/3030-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-5116
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-34yj-pb2j-5faa
2
url VCID-3bce-bp4m-3bcy
vulnerability_id VCID-3bce-bp4m-3bcy
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6362.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6362.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6362
reference_id
reference_type
scores
0
value 0.00411
scoring_system epss
scoring_elements 0.61467
published_at 2026-04-18T12:55:00Z
1
value 0.00411
scoring_system epss
scoring_elements 0.61424
published_at 2026-04-13T12:55:00Z
2
value 0.00411
scoring_system epss
scoring_elements 0.61463
published_at 2026-04-16T12:55:00Z
3
value 0.01378
scoring_system epss
scoring_elements 0.80262
published_at 2026-04-12T12:55:00Z
4
value 0.01378
scoring_system epss
scoring_elements 0.80204
published_at 2026-04-01T12:55:00Z
5
value 0.01378
scoring_system epss
scoring_elements 0.80212
published_at 2026-04-02T12:55:00Z
6
value 0.01378
scoring_system epss
scoring_elements 0.80232
published_at 2026-04-04T12:55:00Z
7
value 0.01378
scoring_system epss
scoring_elements 0.8022
published_at 2026-04-07T12:55:00Z
8
value 0.01378
scoring_system epss
scoring_elements 0.80248
published_at 2026-04-08T12:55:00Z
9
value 0.01378
scoring_system epss
scoring_elements 0.80259
published_at 2026-04-09T12:55:00Z
10
value 0.01378
scoring_system epss
scoring_elements 0.80277
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6362
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/libgd/libgd/issues/381
reference_id
reference_type
scores
url https://github.com/libgd/libgd/issues/381
5
reference_url https://github.com/libgd/libgd/releases/tag/gd-2.2.5
reference_id
reference_type
scores
url https://github.com/libgd/libgd/releases/tag/gd-2.2.5
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2BLXX7KNRE7ZVQAKGTHHWS33CUCXVUP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2BLXX7KNRE7ZVQAKGTHHWS33CUCXVUP/
7
reference_url http://www.debian.org/security/2017/dsa-3961
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3961
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1489842
reference_id 1489842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1489842
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:libgd:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6362
reference_id CVE-2017-6362
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6362
15
reference_url https://usn.ubuntu.com/3410-1/
reference_id USN-3410-1
reference_type
scores
url https://usn.ubuntu.com/3410-1/
16
reference_url https://usn.ubuntu.com/3410-2/
reference_id USN-3410-2
reference_type
scores
url https://usn.ubuntu.com/3410-2/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
2
url pkg:deb/debian/libgd2@2.2.5-5.2
purl pkg:deb/debian/libgd2@2.2.5-5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g3zj-r8ag-a7ej
1
vulnerability VCID-jun7-q9ts-ebfe
2
vulnerability VCID-qqe4-4aja-j7dz
3
vulnerability VCID-s83u-wk4f-wkfd
4
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2
aliases CVE-2017-6362
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3bce-bp4m-3bcy
3
url VCID-3v99-kbeq-47d8
vulnerability_id VCID-3v99-kbeq-47d8
summary
Multiple vulnerabilities have been found in GD, the worst of which
    could result in the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5711.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5711.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5711
reference_id
reference_type
scores
0
value 0.07835
scoring_system epss
scoring_elements 0.91953
published_at 2026-04-01T12:55:00Z
1
value 0.07835
scoring_system epss
scoring_elements 0.92005
published_at 2026-04-18T12:55:00Z
2
value 0.07835
scoring_system epss
scoring_elements 0.9199
published_at 2026-04-13T12:55:00Z
3
value 0.07835
scoring_system epss
scoring_elements 0.92008
published_at 2026-04-16T12:55:00Z
4
value 0.07835
scoring_system epss
scoring_elements 0.91961
published_at 2026-04-02T12:55:00Z
5
value 0.07835
scoring_system epss
scoring_elements 0.91969
published_at 2026-04-04T12:55:00Z
6
value 0.07835
scoring_system epss
scoring_elements 0.91975
published_at 2026-04-07T12:55:00Z
7
value 0.07835
scoring_system epss
scoring_elements 0.91988
published_at 2026-04-08T12:55:00Z
8
value 0.07835
scoring_system epss
scoring_elements 0.91991
published_at 2026-04-09T12:55:00Z
9
value 0.07835
scoring_system epss
scoring_elements 0.91994
published_at 2026-04-11T12:55:00Z
10
value 0.07835
scoring_system epss
scoring_elements 0.91993
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5711
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535246
reference_id 1535246
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535246
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887485
reference_id 887485
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887485
16
reference_url https://security.archlinux.org/AVG-865
reference_id AVG-865
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-865
17
reference_url https://security.gentoo.org/glsa/201903-18
reference_id GLSA-201903-18
reference_type
scores
url https://security.gentoo.org/glsa/201903-18
18
reference_url https://access.redhat.com/errata/RHSA-2018:1296
reference_id RHSA-2018:1296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1296
19
reference_url https://access.redhat.com/errata/RHSA-2019:2519
reference_id RHSA-2019:2519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2519
20
reference_url https://usn.ubuntu.com/3755-1/
reference_id USN-3755-1
reference_type
scores
url https://usn.ubuntu.com/3755-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.2.5-5.2
purl pkg:deb/debian/libgd2@2.2.5-5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g3zj-r8ag-a7ej
1
vulnerability VCID-jun7-q9ts-ebfe
2
vulnerability VCID-qqe4-4aja-j7dz
3
vulnerability VCID-s83u-wk4f-wkfd
4
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2
aliases CVE-2018-5711
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3v99-kbeq-47d8
4
url VCID-45dp-3xz9-qyd3
vulnerability_id VCID-45dp-3xz9-qyd3
summary
A vulnerability in libpng may allow a remote attacker to crash applications
    that handle untrusted images.
references
0
reference_url http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html
reference_id
reference_type
scores
url http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html
1
reference_url http://docs.info.apple.com/article.html?artnum=307562
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=307562
2
reference_url http://irrlicht.sourceforge.net/changes.txt
reference_id
reference_type
scores
url http://irrlicht.sourceforge.net/changes.txt
3
reference_url http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
4
reference_url http://openpkg.com/go/OpenPKG-SA-2007.013
reference_id
reference_type
scores
url http://openpkg.com/go/OpenPKG-SA-2007.013
5
reference_url http://osvdb.org/36196
reference_id
reference_type
scores
url http://osvdb.org/36196
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2445.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2445.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2445
reference_id
reference_type
scores
0
value 0.38264
scoring_system epss
scoring_elements 0.97239
published_at 2026-04-18T12:55:00Z
1
value 0.38264
scoring_system epss
scoring_elements 0.972
published_at 2026-04-01T12:55:00Z
2
value 0.38264
scoring_system epss
scoring_elements 0.97206
published_at 2026-04-02T12:55:00Z
3
value 0.38264
scoring_system epss
scoring_elements 0.97212
published_at 2026-04-04T12:55:00Z
4
value 0.38264
scoring_system epss
scoring_elements 0.97213
published_at 2026-04-07T12:55:00Z
5
value 0.38264
scoring_system epss
scoring_elements 0.97222
published_at 2026-04-08T12:55:00Z
6
value 0.38264
scoring_system epss
scoring_elements 0.97223
published_at 2026-04-09T12:55:00Z
7
value 0.38264
scoring_system epss
scoring_elements 0.97227
published_at 2026-04-12T12:55:00Z
8
value 0.38264
scoring_system epss
scoring_elements 0.97228
published_at 2026-04-13T12:55:00Z
9
value 0.38264
scoring_system epss
scoring_elements 0.97236
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2445
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445
9
reference_url http://secunia.com/advisories/25268
reference_id
reference_type
scores
url http://secunia.com/advisories/25268
10
reference_url http://secunia.com/advisories/25273
reference_id
reference_type
scores
url http://secunia.com/advisories/25273
11
reference_url http://secunia.com/advisories/25292
reference_id
reference_type
scores
url http://secunia.com/advisories/25292
12
reference_url http://secunia.com/advisories/25329
reference_id
reference_type
scores
url http://secunia.com/advisories/25329
13
reference_url http://secunia.com/advisories/25353
reference_id
reference_type
scores
url http://secunia.com/advisories/25353
14
reference_url http://secunia.com/advisories/25461
reference_id
reference_type
scores
url http://secunia.com/advisories/25461
15
reference_url http://secunia.com/advisories/25554
reference_id
reference_type
scores
url http://secunia.com/advisories/25554
16
reference_url http://secunia.com/advisories/25571
reference_id
reference_type
scores
url http://secunia.com/advisories/25571
17
reference_url http://secunia.com/advisories/25742
reference_id
reference_type
scores
url http://secunia.com/advisories/25742
18
reference_url http://secunia.com/advisories/25787
reference_id
reference_type
scores
url http://secunia.com/advisories/25787
19
reference_url http://secunia.com/advisories/25867
reference_id
reference_type
scores
url http://secunia.com/advisories/25867
20
reference_url http://secunia.com/advisories/27056
reference_id
reference_type
scores
url http://secunia.com/advisories/27056
21
reference_url http://secunia.com/advisories/29420
reference_id
reference_type
scores
url http://secunia.com/advisories/29420
22
reference_url http://secunia.com/advisories/30161
reference_id
reference_type
scores
url http://secunia.com/advisories/30161
23
reference_url http://secunia.com/advisories/31168
reference_id
reference_type
scores
url http://secunia.com/advisories/31168
24
reference_url http://secunia.com/advisories/34388
reference_id
reference_type
scores
url http://secunia.com/advisories/34388
25
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34340
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34340
26
reference_url https://issues.rpath.com/browse/RPL-1381
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1381
27
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650
28
reference_url http://sourceforge.net/project/shownotes.php?release_id=508653&group_id=5624
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=508653&group_id=5624
29
reference_url http://sourceforge.net/project/shownotes.php?release_id=508656&group_id=5624
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=508656&group_id=5624
30
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094
31
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1
32
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1
33
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm
34
reference_url http://www.coresecurity.com/?action=item&id=2148
reference_id
reference_type
scores
url http://www.coresecurity.com/?action=item&id=2148
35
reference_url http://www.debian.org/security/2008/dsa-1613
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1613
36
reference_url http://www.debian.org/security/2009/dsa-1750
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1750
37
reference_url http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml
38
reference_url http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
39
reference_url http://www.kb.cert.org/vuls/id/684664
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/684664
40
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:116
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:116
41
reference_url http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt
reference_id
reference_type
scores
url http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt
42
reference_url http://www.novell.com/linux/security/advisories/2007_13_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_13_sr.html
43
reference_url http://www.redhat.com/support/errata/RHSA-2007-0356.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0356.html
44
reference_url http://www.securityfocus.com/archive/1/468910/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/468910/100/0/threaded
45
reference_url http://www.securityfocus.com/archive/1/489135/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/489135/100/0/threaded
46
reference_url http://www.securityfocus.com/bid/24000
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24000
47
reference_url http://www.securityfocus.com/bid/24023
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24023
48
reference_url http://www.securitytracker.com/id?1018078
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018078
49
reference_url http://www.trustix.org/errata/2007/0019/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0019/
50
reference_url http://www.ubuntu.com/usn/usn-472-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-472-1
51
reference_url http://www.vupen.com/english/advisories/2007/1838
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1838
52
reference_url http://www.vupen.com/english/advisories/2007/2385
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2385
53
reference_url http://www.vupen.com/english/advisories/2008/0924/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0924/references
54
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=239425
reference_id 239425
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=239425
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2445
reference_id CVE-2007-2445
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-2445
58
reference_url https://security.gentoo.org/glsa/200705-24
reference_id GLSA-200705-24
reference_type
scores
url https://security.gentoo.org/glsa/200705-24
59
reference_url https://security.gentoo.org/glsa/201412-11
reference_id GLSA-201412-11
reference_type
scores
url https://security.gentoo.org/glsa/201412-11
60
reference_url https://access.redhat.com/errata/RHSA-2007:0356
reference_id RHSA-2007:0356
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0356
61
reference_url https://usn.ubuntu.com/472-1/
reference_id USN-472-1
reference_type
scores
url https://usn.ubuntu.com/472-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4ehv-84qa-fubx
5
vulnerability VCID-4eyx-7fmr-r7dm
6
vulnerability VCID-6xda-97rd-9bam
7
vulnerability VCID-6ysv-9bmx-w7df
8
vulnerability VCID-75xx-y3xu-cqe2
9
vulnerability VCID-7rvx-8x2z-7kdm
10
vulnerability VCID-9wvm-w1qk-xycw
11
vulnerability VCID-9zks-j1fv-ukew
12
vulnerability VCID-b878-mmfs-e3g1
13
vulnerability VCID-cr4d-8dhn-gkgq
14
vulnerability VCID-fcm8-f9e6-83b4
15
vulnerability VCID-fwyg-v128-k7c9
16
vulnerability VCID-g1b8-dkd3-j3a2
17
vulnerability VCID-g3zj-r8ag-a7ej
18
vulnerability VCID-habv-tr8c-rucd
19
vulnerability VCID-hwys-fv79-b7d8
20
vulnerability VCID-j52b-eq6b-dqae
21
vulnerability VCID-jhzv-9ey6-gkdz
22
vulnerability VCID-jun7-q9ts-ebfe
23
vulnerability VCID-k6qv-tnq5-ybd7
24
vulnerability VCID-ku2g-q6cg-ayhc
25
vulnerability VCID-m3ve-pf4u-9qhh
26
vulnerability VCID-pnee-e13t-57a2
27
vulnerability VCID-qqe4-4aja-j7dz
28
vulnerability VCID-r7yv-ryzk-z3e8
29
vulnerability VCID-s33d-rhg8-wqej
30
vulnerability VCID-s83u-wk4f-wkfd
31
vulnerability VCID-sszm-mvm2-m7ee
32
vulnerability VCID-tfaf-hb2s-fyb9
33
vulnerability VCID-vya2-pzx7-m7c1
34
vulnerability VCID-x14b-aaj3-nyed
35
vulnerability VCID-x635-b1cj-m7d7
36
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1
aliases CVE-2007-2445
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45dp-3xz9-qyd3
5
url VCID-4ehv-84qa-fubx
vulnerability_id VCID-4ehv-84qa-fubx
summary The GD library is prone to a buffer overflow vulnerability.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3546
reference_id
reference_type
scores
0
value 0.04125
scoring_system epss
scoring_elements 0.8858
published_at 2026-04-01T12:55:00Z
1
value 0.04125
scoring_system epss
scoring_elements 0.88606
published_at 2026-04-04T12:55:00Z
2
value 0.04125
scoring_system epss
scoring_elements 0.88608
published_at 2026-04-07T12:55:00Z
3
value 0.04125
scoring_system epss
scoring_elements 0.88627
published_at 2026-04-08T12:55:00Z
4
value 0.04125
scoring_system epss
scoring_elements 0.88631
published_at 2026-04-09T12:55:00Z
5
value 0.04125
scoring_system epss
scoring_elements 0.88643
published_at 2026-04-11T12:55:00Z
6
value 0.04125
scoring_system epss
scoring_elements 0.88589
published_at 2026-04-02T12:55:00Z
7
value 0.04663
scoring_system epss
scoring_elements 0.89332
published_at 2026-04-16T12:55:00Z
8
value 0.04663
scoring_system epss
scoring_elements 0.89331
published_at 2026-04-18T12:55:00Z
9
value 0.04663
scoring_system epss
scoring_elements 0.89322
published_at 2026-04-12T12:55:00Z
10
value 0.04663
scoring_system epss
scoring_elements 0.89319
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=529213
reference_id 529213
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=529213
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534
reference_id 552534
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
reference_id 601525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
6
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
7
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
8
reference_url https://security.gentoo.org/glsa/201001-03
reference_id GLSA-201001-03
reference_type
scores
url https://security.gentoo.org/glsa/201001-03
9
reference_url https://security.gentoo.org/glsa/201006-16
reference_id GLSA-201006-16
reference_type
scores
url https://security.gentoo.org/glsa/201006-16
10
reference_url https://access.redhat.com/errata/RHSA-2010:0003
reference_id RHSA-2010:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0003
11
reference_url https://access.redhat.com/errata/RHSA-2010:0040
reference_id RHSA-2010:0040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0040
12
reference_url https://usn.ubuntu.com/854-1/
reference_id USN-854-1
reference_type
scores
url https://usn.ubuntu.com/854-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-5
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9wvm-w1qk-xycw
10
vulnerability VCID-9zks-j1fv-ukew
11
vulnerability VCID-b878-mmfs-e3g1
12
vulnerability VCID-cr4d-8dhn-gkgq
13
vulnerability VCID-fcm8-f9e6-83b4
14
vulnerability VCID-fwyg-v128-k7c9
15
vulnerability VCID-g1b8-dkd3-j3a2
16
vulnerability VCID-g3zj-r8ag-a7ej
17
vulnerability VCID-habv-tr8c-rucd
18
vulnerability VCID-hwys-fv79-b7d8
19
vulnerability VCID-j52b-eq6b-dqae
20
vulnerability VCID-jhzv-9ey6-gkdz
21
vulnerability VCID-jun7-q9ts-ebfe
22
vulnerability VCID-k6qv-tnq5-ybd7
23
vulnerability VCID-ku2g-q6cg-ayhc
24
vulnerability VCID-m3ve-pf4u-9qhh
25
vulnerability VCID-pnee-e13t-57a2
26
vulnerability VCID-qqe4-4aja-j7dz
27
vulnerability VCID-r7yv-ryzk-z3e8
28
vulnerability VCID-s33d-rhg8-wqej
29
vulnerability VCID-s83u-wk4f-wkfd
30
vulnerability VCID-sszm-mvm2-m7ee
31
vulnerability VCID-tfaf-hb2s-fyb9
32
vulnerability VCID-vya2-pzx7-m7c1
33
vulnerability VCID-x14b-aaj3-nyed
34
vulnerability VCID-x635-b1cj-m7d7
35
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-5
aliases CVE-2009-3546
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ehv-84qa-fubx
6
url VCID-4eyx-7fmr-r7dm
vulnerability_id VCID-4eyx-7fmr-r7dm
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6906.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6906.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6906
reference_id
reference_type
scores
0
value 0.00448
scoring_system epss
scoring_elements 0.63448
published_at 2026-04-01T12:55:00Z
1
value 0.00448
scoring_system epss
scoring_elements 0.63508
published_at 2026-04-02T12:55:00Z
2
value 0.00448
scoring_system epss
scoring_elements 0.63535
published_at 2026-04-13T12:55:00Z
3
value 0.00448
scoring_system epss
scoring_elements 0.63499
published_at 2026-04-07T12:55:00Z
4
value 0.00448
scoring_system epss
scoring_elements 0.63551
published_at 2026-04-08T12:55:00Z
5
value 0.00448
scoring_system epss
scoring_elements 0.63568
published_at 2026-04-09T12:55:00Z
6
value 0.00448
scoring_system epss
scoring_elements 0.63584
published_at 2026-04-11T12:55:00Z
7
value 0.00448
scoring_system epss
scoring_elements 0.63569
published_at 2026-04-12T12:55:00Z
8
value 0.00448
scoring_system epss
scoring_elements 0.63571
published_at 2026-04-16T12:55:00Z
9
value 0.00448
scoring_system epss
scoring_elements 0.63578
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6906
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1435313
reference_id 1435313
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1435313
10
reference_url https://usn.ubuntu.com/3213-1/
reference_id USN-3213-1
reference_type
scores
url https://usn.ubuntu.com/3213-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-6906
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4eyx-7fmr-r7dm
7
url VCID-6xda-97rd-9bam
vulnerability_id VCID-6xda-97rd-9bam
summary
Multiple vulnerabilities have been found in GD, the worst of which
    could result in the remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html
2
reference_url http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html
3
reference_url http://php.net/ChangeLog-5.php
reference_id
reference_type
scores
url http://php.net/ChangeLog-5.php
4
reference_url http://php.net/ChangeLog-7.php
reference_id
reference_type
scores
url http://php.net/ChangeLog-7.php
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6977.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6977.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6977
reference_id
reference_type
scores
0
value 0.863
scoring_system epss
scoring_elements 0.99399
published_at 2026-04-02T12:55:00Z
1
value 0.863
scoring_system epss
scoring_elements 0.99407
published_at 2026-04-18T12:55:00Z
2
value 0.863
scoring_system epss
scoring_elements 0.99403
published_at 2026-04-09T12:55:00Z
3
value 0.863
scoring_system epss
scoring_elements 0.99404
published_at 2026-04-11T12:55:00Z
4
value 0.863
scoring_system epss
scoring_elements 0.99405
published_at 2026-04-13T12:55:00Z
5
value 0.863
scoring_system epss
scoring_elements 0.99408
published_at 2026-04-16T12:55:00Z
6
value 0.863
scoring_system epss
scoring_elements 0.994
published_at 2026-04-04T12:55:00Z
7
value 0.863
scoring_system epss
scoring_elements 0.99402
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6977
7
reference_url https://bugs.php.net/bug.php?id=77270
reference_id
reference_type
scores
url https://bugs.php.net/bug.php?id=77270
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/
16
reference_url https://security.netapp.com/advisory/ntap-20190315-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190315-0003/
17
reference_url https://www.debian.org/security/2019/dsa-4384
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4384
18
reference_url https://www.exploit-db.com/exploits/46677/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/46677/
19
reference_url http://www.securityfocus.com/bid/106731
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106731
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1672207
reference_id 1672207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1672207
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920645
reference_id 920645
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920645
22
reference_url https://security.archlinux.org/AVG-865
reference_id AVG-865
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-865
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:7.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.3.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
33
reference_url https://github.com/cfreal/exploits/blob/1a671d1d8510e93a0b2607261e9b779562585fe2/CVE-2019-6977-imagecolormatch/exploit.php
reference_id CVE-2019-6977
reference_type exploit
scores
url https://github.com/cfreal/exploits/blob/1a671d1d8510e93a0b2607261e9b779562585fe2/CVE-2019-6977-imagecolormatch/exploit.php
34
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/46677.php
reference_id CVE-2019-6977
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/46677.php
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6977
reference_id CVE-2019-6977
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-6977
36
reference_url https://security.gentoo.org/glsa/201903-18
reference_id GLSA-201903-18
reference_type
scores
url https://security.gentoo.org/glsa/201903-18
37
reference_url https://access.redhat.com/errata/RHSA-2019:2519
reference_id RHSA-2019:2519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2519
38
reference_url https://access.redhat.com/errata/RHSA-2019:3299
reference_id RHSA-2019:3299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3299
39
reference_url https://access.redhat.com/errata/RHSA-2020:4659
reference_id RHSA-2020:4659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4659
40
reference_url https://usn.ubuntu.com/3900-1/
reference_id USN-3900-1
reference_type
scores
url https://usn.ubuntu.com/3900-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
1
url pkg:deb/debian/libgd2@2.2.5-5.2
purl pkg:deb/debian/libgd2@2.2.5-5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g3zj-r8ag-a7ej
1
vulnerability VCID-jun7-q9ts-ebfe
2
vulnerability VCID-qqe4-4aja-j7dz
3
vulnerability VCID-s83u-wk4f-wkfd
4
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2
aliases CVE-2019-6977
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xda-97rd-9bam
8
url VCID-6ysv-9bmx-w7df
vulnerability_id VCID-6ysv-9bmx-w7df
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7890.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7890.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7890
reference_id
reference_type
scores
0
value 0.25333
scoring_system epss
scoring_elements 0.96165
published_at 2026-04-01T12:55:00Z
1
value 0.25333
scoring_system epss
scoring_elements 0.96193
published_at 2026-04-08T12:55:00Z
2
value 0.25333
scoring_system epss
scoring_elements 0.96181
published_at 2026-04-04T12:55:00Z
3
value 0.25333
scoring_system epss
scoring_elements 0.96183
published_at 2026-04-07T12:55:00Z
4
value 0.25333
scoring_system epss
scoring_elements 0.96196
published_at 2026-04-09T12:55:00Z
5
value 0.25333
scoring_system epss
scoring_elements 0.96201
published_at 2026-04-11T12:55:00Z
6
value 0.25333
scoring_system epss
scoring_elements 0.962
published_at 2026-04-12T12:55:00Z
7
value 0.25333
scoring_system epss
scoring_elements 0.96173
published_at 2026-04-02T12:55:00Z
8
value 0.28056
scoring_system epss
scoring_elements 0.96475
published_at 2026-04-13T12:55:00Z
9
value 0.28056
scoring_system epss
scoring_elements 0.96482
published_at 2026-04-16T12:55:00Z
10
value 0.28056
scoring_system epss
scoring_elements 0.96486
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7890
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1473822
reference_id 1473822
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1473822
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869263
reference_id 869263
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869263
6
reference_url https://access.redhat.com/errata/RHSA-2018:0406
reference_id RHSA-2018:0406
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0406
7
reference_url https://access.redhat.com/errata/RHSA-2018:1296
reference_id RHSA-2018:1296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1296
8
reference_url https://usn.ubuntu.com/3389-1/
reference_id USN-3389-1
reference_type
scores
url https://usn.ubuntu.com/3389-1/
9
reference_url https://usn.ubuntu.com/3389-2/
reference_id USN-3389-2
reference_type
scores
url https://usn.ubuntu.com/3389-2/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
2
url pkg:deb/debian/libgd2@2.2.5-5.2
purl pkg:deb/debian/libgd2@2.2.5-5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g3zj-r8ag-a7ej
1
vulnerability VCID-jun7-q9ts-ebfe
2
vulnerability VCID-qqe4-4aja-j7dz
3
vulnerability VCID-s83u-wk4f-wkfd
4
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2
aliases CVE-2017-7890
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ysv-9bmx-w7df
9
url VCID-75xx-y3xu-cqe2
vulnerability_id VCID-75xx-y3xu-cqe2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6911.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6911.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6911
reference_id
reference_type
scores
0
value 0.00641
scoring_system epss
scoring_elements 0.70523
published_at 2026-04-01T12:55:00Z
1
value 0.00641
scoring_system epss
scoring_elements 0.7064
published_at 2026-04-18T12:55:00Z
2
value 0.00641
scoring_system epss
scoring_elements 0.70587
published_at 2026-04-13T12:55:00Z
3
value 0.00641
scoring_system epss
scoring_elements 0.70631
published_at 2026-04-16T12:55:00Z
4
value 0.00641
scoring_system epss
scoring_elements 0.70537
published_at 2026-04-02T12:55:00Z
5
value 0.00641
scoring_system epss
scoring_elements 0.70554
published_at 2026-04-04T12:55:00Z
6
value 0.00641
scoring_system epss
scoring_elements 0.70532
published_at 2026-04-07T12:55:00Z
7
value 0.00641
scoring_system epss
scoring_elements 0.70577
published_at 2026-04-08T12:55:00Z
8
value 0.00641
scoring_system epss
scoring_elements 0.70592
published_at 2026-04-09T12:55:00Z
9
value 0.00641
scoring_system epss
scoring_elements 0.70615
published_at 2026-04-11T12:55:00Z
10
value 0.00641
scoring_system epss
scoring_elements 0.706
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6911
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388787
reference_id 1388787
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388787
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840806
reference_id 840806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840806
8
reference_url https://security.archlinux.org/ASA-201611-19
reference_id ASA-201611-19
reference_type
scores
url https://security.archlinux.org/ASA-201611-19
9
reference_url https://security.archlinux.org/AVG-58
reference_id AVG-58
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-58
10
reference_url https://usn.ubuntu.com/3117-1/
reference_id USN-3117-1
reference_type
scores
url https://usn.ubuntu.com/3117-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-6911
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75xx-y3xu-cqe2
10
url VCID-7d1e-wnq6-4qfr
vulnerability_id VCID-7d1e-wnq6-4qfr
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
reference_id
reference_type
scores
url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
1
reference_url http://bugs.libgd.org/?do=details&task_id=74
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=74
2
reference_url http://bugs.libgd.org/?do=details&task_id=92
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=92
3
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
6
reference_url http://osvdb.org/42062
reference_id
reference_type
scores
url http://osvdb.org/42062
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3477.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3477.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3477
reference_id
reference_type
scores
0
value 0.07202
scoring_system epss
scoring_elements 0.91616
published_at 2026-04-18T12:55:00Z
1
value 0.07202
scoring_system epss
scoring_elements 0.91621
published_at 2026-04-16T12:55:00Z
2
value 0.07202
scoring_system epss
scoring_elements 0.91601
published_at 2026-04-12T12:55:00Z
3
value 0.07202
scoring_system epss
scoring_elements 0.91599
published_at 2026-04-13T12:55:00Z
4
value 0.07483
scoring_system epss
scoring_elements 0.91745
published_at 2026-04-01T12:55:00Z
5
value 0.07483
scoring_system epss
scoring_elements 0.91786
published_at 2026-04-09T12:55:00Z
6
value 0.07483
scoring_system epss
scoring_elements 0.91789
published_at 2026-04-11T12:55:00Z
7
value 0.07483
scoring_system epss
scoring_elements 0.91779
published_at 2026-04-08T12:55:00Z
8
value 0.07483
scoring_system epss
scoring_elements 0.91753
published_at 2026-04-02T12:55:00Z
9
value 0.07483
scoring_system epss
scoring_elements 0.91759
published_at 2026-04-04T12:55:00Z
10
value 0.07483
scoring_system epss
scoring_elements 0.91766
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3477
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477
11
reference_url http://secunia.com/advisories/25860
reference_id
reference_type
scores
url http://secunia.com/advisories/25860
12
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
13
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
14
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
15
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
16
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
17
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
18
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
19
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
20
reference_url http://secunia.com/advisories/31168
reference_id
reference_type
scores
url http://secunia.com/advisories/31168
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
23
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
24
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
25
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
26
reference_url http://www.debian.org/security/2008/dsa-1613
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1613
27
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
28
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
29
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
30
reference_url http://www.novell.com/linux/security/advisories/2007_15_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_15_sr.html
31
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
32
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
33
reference_url http://www.securityfocus.com/bid/24651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24651
34
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
35
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277221
reference_id 277221
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277221
37
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
reference_id 601525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
38
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
39
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3477
reference_id CVE-2007-3477
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3477
50
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
51
reference_url https://usn.ubuntu.com/854-1/
reference_id USN-854-1
reference_type
scores
url https://usn.ubuntu.com/854-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4ehv-84qa-fubx
5
vulnerability VCID-4eyx-7fmr-r7dm
6
vulnerability VCID-6xda-97rd-9bam
7
vulnerability VCID-6ysv-9bmx-w7df
8
vulnerability VCID-75xx-y3xu-cqe2
9
vulnerability VCID-7rvx-8x2z-7kdm
10
vulnerability VCID-9wvm-w1qk-xycw
11
vulnerability VCID-9zks-j1fv-ukew
12
vulnerability VCID-b878-mmfs-e3g1
13
vulnerability VCID-cr4d-8dhn-gkgq
14
vulnerability VCID-fcm8-f9e6-83b4
15
vulnerability VCID-fwyg-v128-k7c9
16
vulnerability VCID-g1b8-dkd3-j3a2
17
vulnerability VCID-g3zj-r8ag-a7ej
18
vulnerability VCID-habv-tr8c-rucd
19
vulnerability VCID-hwys-fv79-b7d8
20
vulnerability VCID-j52b-eq6b-dqae
21
vulnerability VCID-jhzv-9ey6-gkdz
22
vulnerability VCID-jun7-q9ts-ebfe
23
vulnerability VCID-k6qv-tnq5-ybd7
24
vulnerability VCID-ku2g-q6cg-ayhc
25
vulnerability VCID-m3ve-pf4u-9qhh
26
vulnerability VCID-pnee-e13t-57a2
27
vulnerability VCID-qqe4-4aja-j7dz
28
vulnerability VCID-r7yv-ryzk-z3e8
29
vulnerability VCID-s33d-rhg8-wqej
30
vulnerability VCID-s83u-wk4f-wkfd
31
vulnerability VCID-sszm-mvm2-m7ee
32
vulnerability VCID-tfaf-hb2s-fyb9
33
vulnerability VCID-vya2-pzx7-m7c1
34
vulnerability VCID-x14b-aaj3-nyed
35
vulnerability VCID-x635-b1cj-m7d7
36
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1
aliases CVE-2007-3477
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7d1e-wnq6-4qfr
11
url VCID-7rvx-8x2z-7kdm
vulnerability_id VCID-7rvx-8x2z-7kdm
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6214.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6214.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6214
reference_id
reference_type
scores
0
value 0.07362
scoring_system epss
scoring_elements 0.91672
published_at 2026-04-01T12:55:00Z
1
value 0.07362
scoring_system epss
scoring_elements 0.9168
published_at 2026-04-02T12:55:00Z
2
value 0.07362
scoring_system epss
scoring_elements 0.91686
published_at 2026-04-04T12:55:00Z
3
value 0.07362
scoring_system epss
scoring_elements 0.91694
published_at 2026-04-07T12:55:00Z
4
value 0.07362
scoring_system epss
scoring_elements 0.91707
published_at 2026-04-08T12:55:00Z
5
value 0.07362
scoring_system epss
scoring_elements 0.91714
published_at 2026-04-09T12:55:00Z
6
value 0.07362
scoring_system epss
scoring_elements 0.91717
published_at 2026-04-11T12:55:00Z
7
value 0.07362
scoring_system epss
scoring_elements 0.91719
published_at 2026-04-12T12:55:00Z
8
value 0.07362
scoring_system epss
scoring_elements 0.91715
published_at 2026-04-13T12:55:00Z
9
value 0.07362
scoring_system epss
scoring_elements 0.91736
published_at 2026-04-16T12:55:00Z
10
value 0.07362
scoring_system epss
scoring_elements 0.91729
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1356466
reference_id 1356466
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1356466
11
reference_url https://usn.ubuntu.com/3060-1/
reference_id USN-3060-1
reference_type
scores
url https://usn.ubuntu.com/3060-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-6214
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7rvx-8x2z-7kdm
12
url VCID-9wvm-w1qk-xycw
vulnerability_id VCID-9wvm-w1qk-xycw
summary
Multiple vulnerabilities have been found in PHP, the worst of which
    could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9709.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9709.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9709
reference_id
reference_type
scores
0
value 0.16543
scoring_system epss
scoring_elements 0.94874
published_at 2026-04-01T12:55:00Z
1
value 0.16543
scoring_system epss
scoring_elements 0.94883
published_at 2026-04-02T12:55:00Z
2
value 0.16543
scoring_system epss
scoring_elements 0.94886
published_at 2026-04-04T12:55:00Z
3
value 0.16543
scoring_system epss
scoring_elements 0.94888
published_at 2026-04-07T12:55:00Z
4
value 0.16543
scoring_system epss
scoring_elements 0.94897
published_at 2026-04-08T12:55:00Z
5
value 0.16543
scoring_system epss
scoring_elements 0.94901
published_at 2026-04-09T12:55:00Z
6
value 0.16543
scoring_system epss
scoring_elements 0.94906
published_at 2026-04-11T12:55:00Z
7
value 0.16543
scoring_system epss
scoring_elements 0.94908
published_at 2026-04-12T12:55:00Z
8
value 0.16543
scoring_system epss
scoring_elements 0.9491
published_at 2026-04-13T12:55:00Z
9
value 0.16543
scoring_system epss
scoring_elements 0.94917
published_at 2026-04-16T12:55:00Z
10
value 0.16543
scoring_system epss
scoring_elements 0.94921
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9709
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1188639
reference_id 1188639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1188639
5
reference_url https://security.gentoo.org/glsa/201606-10
reference_id GLSA-201606-10
reference_type
scores
url https://security.gentoo.org/glsa/201606-10
6
reference_url https://security.gentoo.org/glsa/201607-04
reference_id GLSA-201607-04
reference_type
scores
url https://security.gentoo.org/glsa/201607-04
7
reference_url https://access.redhat.com/errata/RHSA-2015:1053
reference_id RHSA-2015:1053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1053
8
reference_url https://access.redhat.com/errata/RHSA-2015:1066
reference_id RHSA-2015:1066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1066
9
reference_url https://access.redhat.com/errata/RHSA-2015:1135
reference_id RHSA-2015:1135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1135
10
reference_url https://access.redhat.com/errata/RHSA-2015:1218
reference_id RHSA-2015:1218
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1218
11
reference_url https://usn.ubuntu.com/2987-1/
reference_id USN-2987-1
reference_type
scores
url https://usn.ubuntu.com/2987-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%2Bdeb7u2
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9wvm-w1qk-xycw
10
vulnerability VCID-9zks-j1fv-ukew
11
vulnerability VCID-b878-mmfs-e3g1
12
vulnerability VCID-cr4d-8dhn-gkgq
13
vulnerability VCID-fcm8-f9e6-83b4
14
vulnerability VCID-fwyg-v128-k7c9
15
vulnerability VCID-g1b8-dkd3-j3a2
16
vulnerability VCID-g3zj-r8ag-a7ej
17
vulnerability VCID-habv-tr8c-rucd
18
vulnerability VCID-hwys-fv79-b7d8
19
vulnerability VCID-j52b-eq6b-dqae
20
vulnerability VCID-jhzv-9ey6-gkdz
21
vulnerability VCID-jun7-q9ts-ebfe
22
vulnerability VCID-k6qv-tnq5-ybd7
23
vulnerability VCID-ku2g-q6cg-ayhc
24
vulnerability VCID-m3ve-pf4u-9qhh
25
vulnerability VCID-pnee-e13t-57a2
26
vulnerability VCID-qqe4-4aja-j7dz
27
vulnerability VCID-r7yv-ryzk-z3e8
28
vulnerability VCID-s33d-rhg8-wqej
29
vulnerability VCID-s83u-wk4f-wkfd
30
vulnerability VCID-sszm-mvm2-m7ee
31
vulnerability VCID-tfaf-hb2s-fyb9
32
vulnerability VCID-vya2-pzx7-m7c1
33
vulnerability VCID-x14b-aaj3-nyed
34
vulnerability VCID-x635-b1cj-m7d7
35
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%252Bdeb7u2
1
url pkg:deb/debian/libgd2@2.1.0-5
purl pkg:deb/debian/libgd2@2.1.0-5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5
aliases CVE-2014-9709
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9wvm-w1qk-xycw
13
url VCID-9zks-j1fv-ukew
vulnerability_id VCID-9zks-j1fv-ukew
summary
Multiple vulnerabilities have been found in GD, the worst of which
    allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183263.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183263.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183724.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183724.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html
3
reference_url http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-2750.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2750.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3074.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3074.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3074
reference_id
reference_type
scores
0
value 0.54698
scoring_system epss
scoring_elements 0.98044
published_at 2026-04-18T12:55:00Z
1
value 0.54698
scoring_system epss
scoring_elements 0.98037
published_at 2026-04-12T12:55:00Z
2
value 0.54698
scoring_system epss
scoring_elements 0.98038
published_at 2026-04-13T12:55:00Z
3
value 0.54698
scoring_system epss
scoring_elements 0.98019
published_at 2026-04-01T12:55:00Z
4
value 0.54698
scoring_system epss
scoring_elements 0.98024
published_at 2026-04-02T12:55:00Z
5
value 0.54698
scoring_system epss
scoring_elements 0.98026
published_at 2026-04-04T12:55:00Z
6
value 0.54698
scoring_system epss
scoring_elements 0.98027
published_at 2026-04-07T12:55:00Z
7
value 0.54698
scoring_system epss
scoring_elements 0.98032
published_at 2026-04-08T12:55:00Z
8
value 0.54698
scoring_system epss
scoring_elements 0.98033
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
21
reference_url http://seclists.org/fulldisclosure/2016/Apr/72
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2016/Apr/72
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://github.com/libgd/libgd/commit/2bb97f407c1145c850416a3bfbcc8cf124e68a19
reference_id
reference_type
scores
url https://github.com/libgd/libgd/commit/2bb97f407c1145c850416a3bfbcc8cf124e68a19
24
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
25
reference_url https://security.gentoo.org/glsa/201611-22
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201611-22
26
reference_url https://www.exploit-db.com/exploits/39736/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/39736/
27
reference_url http://www.debian.org/security/2016/dsa-3556
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3556
28
reference_url http://www.debian.org/security/2016/dsa-3602
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3602
29
reference_url http://www.securityfocus.com/archive/1/538160/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/538160/100/0/threaded
30
reference_url http://www.securityfocus.com/bid/87087
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/87087
31
reference_url http://www.securitytracker.com/id/1035659
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035659
32
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.383127
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.383127
33
reference_url http://www.ubuntu.com/usn/USN-2987-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2987-1
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1321893
reference_id 1321893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1321893
35
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822242
reference_id 822242
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822242
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
47
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/39736.txt
reference_id CVE-2016-3074
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/39736.txt
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3074
reference_id CVE-2016-3074
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3074
49
reference_url https://security.gentoo.org/glsa/201607-04
reference_id GLSA-201607-04
reference_type
scores
url https://security.gentoo.org/glsa/201607-04
50
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
51
reference_url https://usn.ubuntu.com/2987-1/
reference_id USN-2987-1
reference_type
scores
url https://usn.ubuntu.com/2987-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%2Bdeb7u2
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9wvm-w1qk-xycw
10
vulnerability VCID-9zks-j1fv-ukew
11
vulnerability VCID-b878-mmfs-e3g1
12
vulnerability VCID-cr4d-8dhn-gkgq
13
vulnerability VCID-fcm8-f9e6-83b4
14
vulnerability VCID-fwyg-v128-k7c9
15
vulnerability VCID-g1b8-dkd3-j3a2
16
vulnerability VCID-g3zj-r8ag-a7ej
17
vulnerability VCID-habv-tr8c-rucd
18
vulnerability VCID-hwys-fv79-b7d8
19
vulnerability VCID-j52b-eq6b-dqae
20
vulnerability VCID-jhzv-9ey6-gkdz
21
vulnerability VCID-jun7-q9ts-ebfe
22
vulnerability VCID-k6qv-tnq5-ybd7
23
vulnerability VCID-ku2g-q6cg-ayhc
24
vulnerability VCID-m3ve-pf4u-9qhh
25
vulnerability VCID-pnee-e13t-57a2
26
vulnerability VCID-qqe4-4aja-j7dz
27
vulnerability VCID-r7yv-ryzk-z3e8
28
vulnerability VCID-s33d-rhg8-wqej
29
vulnerability VCID-s83u-wk4f-wkfd
30
vulnerability VCID-sszm-mvm2-m7ee
31
vulnerability VCID-tfaf-hb2s-fyb9
32
vulnerability VCID-vya2-pzx7-m7c1
33
vulnerability VCID-x14b-aaj3-nyed
34
vulnerability VCID-x635-b1cj-m7d7
35
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%252Bdeb7u2
1
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
2
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-3074
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9zks-j1fv-ukew
14
url VCID-b878-mmfs-e3g1
vulnerability_id VCID-b878-mmfs-e3g1
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10168.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10168.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10168
reference_id
reference_type
scores
0
value 0.00655
scoring_system epss
scoring_elements 0.70878
published_at 2026-04-01T12:55:00Z
1
value 0.00655
scoring_system epss
scoring_elements 0.70892
published_at 2026-04-02T12:55:00Z
2
value 0.00655
scoring_system epss
scoring_elements 0.7091
published_at 2026-04-04T12:55:00Z
3
value 0.00655
scoring_system epss
scoring_elements 0.70885
published_at 2026-04-07T12:55:00Z
4
value 0.00655
scoring_system epss
scoring_elements 0.70929
published_at 2026-04-08T12:55:00Z
5
value 0.00655
scoring_system epss
scoring_elements 0.70944
published_at 2026-04-09T12:55:00Z
6
value 0.00655
scoring_system epss
scoring_elements 0.70967
published_at 2026-04-11T12:55:00Z
7
value 0.00655
scoring_system epss
scoring_elements 0.70951
published_at 2026-04-12T12:55:00Z
8
value 0.00655
scoring_system epss
scoring_elements 0.70935
published_at 2026-04-13T12:55:00Z
9
value 0.00655
scoring_system epss
scoring_elements 0.70981
published_at 2026-04-16T12:55:00Z
10
value 0.00655
scoring_system epss
scoring_elements 0.70988
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10168
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1418986
reference_id 1418986
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1418986
10
reference_url https://access.redhat.com/errata/RHSA-2017:3221
reference_id RHSA-2017:3221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3221
11
reference_url https://access.redhat.com/errata/RHSA-2018:1296
reference_id RHSA-2018:1296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1296
12
reference_url https://usn.ubuntu.com/3213-1/
reference_id USN-3213-1
reference_type
scores
url https://usn.ubuntu.com/3213-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-10168
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b878-mmfs-e3g1
15
url VCID-busj-qfth-v7e3
vulnerability_id VCID-busj-qfth-v7e3
summary gd: buffer overrun
references
0
reference_url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607
reference_id
reference_type
scores
url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607
1
reference_url http://fedoranews.org/cms/node/2631
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2631
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
4
reference_url http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html
reference_id
reference_type
scores
url http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2007-0155.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0155.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0455.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0455.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0455
reference_id
reference_type
scores
0
value 0.04925
scoring_system epss
scoring_elements 0.89618
published_at 2026-04-09T12:55:00Z
1
value 0.04925
scoring_system epss
scoring_elements 0.89579
published_at 2026-04-01T12:55:00Z
2
value 0.04925
scoring_system epss
scoring_elements 0.89626
published_at 2026-04-11T12:55:00Z
3
value 0.04925
scoring_system epss
scoring_elements 0.89582
published_at 2026-04-02T12:55:00Z
4
value 0.04925
scoring_system epss
scoring_elements 0.89596
published_at 2026-04-07T12:55:00Z
5
value 0.04925
scoring_system epss
scoring_elements 0.89613
published_at 2026-04-08T12:55:00Z
6
value 0.05488
scoring_system epss
scoring_elements 0.90235
published_at 2026-04-18T12:55:00Z
7
value 0.05488
scoring_system epss
scoring_elements 0.90222
published_at 2026-04-12T12:55:00Z
8
value 0.05488
scoring_system epss
scoring_elements 0.90217
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0455
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455
9
reference_url http://secunia.com/advisories/23916
reference_id
reference_type
scores
url http://secunia.com/advisories/23916
10
reference_url http://secunia.com/advisories/24022
reference_id
reference_type
scores
url http://secunia.com/advisories/24022
11
reference_url http://secunia.com/advisories/24052
reference_id
reference_type
scores
url http://secunia.com/advisories/24052
12
reference_url http://secunia.com/advisories/24053
reference_id
reference_type
scores
url http://secunia.com/advisories/24053
13
reference_url http://secunia.com/advisories/24107
reference_id
reference_type
scores
url http://secunia.com/advisories/24107
14
reference_url http://secunia.com/advisories/24143
reference_id
reference_type
scores
url http://secunia.com/advisories/24143
15
reference_url http://secunia.com/advisories/24151
reference_id
reference_type
scores
url http://secunia.com/advisories/24151
16
reference_url http://secunia.com/advisories/24924
reference_id
reference_type
scores
url http://secunia.com/advisories/24924
17
reference_url http://secunia.com/advisories/24945
reference_id
reference_type
scores
url http://secunia.com/advisories/24945
18
reference_url http://secunia.com/advisories/24965
reference_id
reference_type
scores
url http://secunia.com/advisories/24965
19
reference_url http://secunia.com/advisories/25575
reference_id
reference_type
scores
url http://secunia.com/advisories/25575
20
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url https://issues.rpath.com/browse/RPL-1030
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1030
23
reference_url https://issues.rpath.com/browse/RPL-1268
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1268
24
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:035
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:035
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:036
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:036
27
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:038
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:038
28
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:109
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:109
29
reference_url http://www.redhat.com/support/errata/RHSA-2007-0153.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0153.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2007-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0162.html
31
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
32
reference_url http://www.securityfocus.com/archive/1/466166/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/466166/100/0/threaded
33
reference_url http://www.securityfocus.com/bid/22289
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22289
34
reference_url http://www.trustix.org/errata/2007/0007
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0007
35
reference_url http://www.ubuntu.com/usn/usn-473-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-473-1
36
reference_url http://www.vupen.com/english/advisories/2007/0400
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0400
37
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=224607
reference_id 224607
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=224607
39
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408982
reference_id 408982
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408982
40
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
41
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0455
reference_id CVE-2007-0455
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-0455
56
reference_url https://access.redhat.com/errata/RHSA-2007:0153
reference_id RHSA-2007:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0153
57
reference_url https://access.redhat.com/errata/RHSA-2007:0155
reference_id RHSA-2007:0155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0155
58
reference_url https://access.redhat.com/errata/RHSA-2007:0162
reference_id RHSA-2007:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0162
59
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
60
reference_url https://usn.ubuntu.com/473-1/
reference_id USN-473-1
reference_type
scores
url https://usn.ubuntu.com/473-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4ehv-84qa-fubx
5
vulnerability VCID-4eyx-7fmr-r7dm
6
vulnerability VCID-6xda-97rd-9bam
7
vulnerability VCID-6ysv-9bmx-w7df
8
vulnerability VCID-75xx-y3xu-cqe2
9
vulnerability VCID-7rvx-8x2z-7kdm
10
vulnerability VCID-9wvm-w1qk-xycw
11
vulnerability VCID-9zks-j1fv-ukew
12
vulnerability VCID-b878-mmfs-e3g1
13
vulnerability VCID-cr4d-8dhn-gkgq
14
vulnerability VCID-fcm8-f9e6-83b4
15
vulnerability VCID-fwyg-v128-k7c9
16
vulnerability VCID-g1b8-dkd3-j3a2
17
vulnerability VCID-g3zj-r8ag-a7ej
18
vulnerability VCID-habv-tr8c-rucd
19
vulnerability VCID-hwys-fv79-b7d8
20
vulnerability VCID-j52b-eq6b-dqae
21
vulnerability VCID-jhzv-9ey6-gkdz
22
vulnerability VCID-jun7-q9ts-ebfe
23
vulnerability VCID-k6qv-tnq5-ybd7
24
vulnerability VCID-ku2g-q6cg-ayhc
25
vulnerability VCID-m3ve-pf4u-9qhh
26
vulnerability VCID-pnee-e13t-57a2
27
vulnerability VCID-qqe4-4aja-j7dz
28
vulnerability VCID-r7yv-ryzk-z3e8
29
vulnerability VCID-s33d-rhg8-wqej
30
vulnerability VCID-s83u-wk4f-wkfd
31
vulnerability VCID-sszm-mvm2-m7ee
32
vulnerability VCID-tfaf-hb2s-fyb9
33
vulnerability VCID-vya2-pzx7-m7c1
34
vulnerability VCID-x14b-aaj3-nyed
35
vulnerability VCID-x635-b1cj-m7d7
36
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1
aliases CVE-2007-0455
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-busj-qfth-v7e3
16
url VCID-cr4d-8dhn-gkgq
vulnerability_id VCID-cr4d-8dhn-gkgq
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6912.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6912.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6912
reference_id
reference_type
scores
0
value 0.00883
scoring_system epss
scoring_elements 0.75343
published_at 2026-04-01T12:55:00Z
1
value 0.00883
scoring_system epss
scoring_elements 0.75346
published_at 2026-04-02T12:55:00Z
2
value 0.00883
scoring_system epss
scoring_elements 0.75379
published_at 2026-04-04T12:55:00Z
3
value 0.00883
scoring_system epss
scoring_elements 0.75358
published_at 2026-04-07T12:55:00Z
4
value 0.00883
scoring_system epss
scoring_elements 0.75401
published_at 2026-04-08T12:55:00Z
5
value 0.00883
scoring_system epss
scoring_elements 0.75411
published_at 2026-04-09T12:55:00Z
6
value 0.00883
scoring_system epss
scoring_elements 0.75431
published_at 2026-04-11T12:55:00Z
7
value 0.00883
scoring_system epss
scoring_elements 0.75409
published_at 2026-04-12T12:55:00Z
8
value 0.00883
scoring_system epss
scoring_elements 0.75398
published_at 2026-04-13T12:55:00Z
9
value 0.00883
scoring_system epss
scoring_elements 0.7544
published_at 2026-04-16T12:55:00Z
10
value 0.00883
scoring_system epss
scoring_elements 0.75445
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6912
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1417977
reference_id 1417977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1417977
10
reference_url https://usn.ubuntu.com/3213-1/
reference_id USN-3213-1
reference_type
scores
url https://usn.ubuntu.com/3213-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-6912
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cr4d-8dhn-gkgq
17
url VCID-ek5b-jujn-bqet
vulnerability_id VCID-ek5b-jujn-bqet
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
reference_id
reference_type
scores
url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
1
reference_url http://bugs.libgd.org/?do=details&task_id=94
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=94
2
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
5
reference_url http://osvdb.org/37744
reference_id
reference_type
scores
url http://osvdb.org/37744
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3473.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3473.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3473
reference_id
reference_type
scores
0
value 0.10285
scoring_system epss
scoring_elements 0.93188
published_at 2026-04-18T12:55:00Z
1
value 0.10285
scoring_system epss
scoring_elements 0.93183
published_at 2026-04-16T12:55:00Z
2
value 0.10285
scoring_system epss
scoring_elements 0.93165
published_at 2026-04-12T12:55:00Z
3
value 0.10285
scoring_system epss
scoring_elements 0.93167
published_at 2026-04-13T12:55:00Z
4
value 0.12126
scoring_system epss
scoring_elements 0.93768
published_at 2026-04-01T12:55:00Z
5
value 0.12126
scoring_system epss
scoring_elements 0.93802
published_at 2026-04-09T12:55:00Z
6
value 0.12126
scoring_system epss
scoring_elements 0.93807
published_at 2026-04-11T12:55:00Z
7
value 0.12126
scoring_system epss
scoring_elements 0.938
published_at 2026-04-08T12:55:00Z
8
value 0.12126
scoring_system epss
scoring_elements 0.93778
published_at 2026-04-02T12:55:00Z
9
value 0.12126
scoring_system epss
scoring_elements 0.93787
published_at 2026-04-04T12:55:00Z
10
value 0.12126
scoring_system epss
scoring_elements 0.93791
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3473
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473
10
reference_url http://secunia.com/advisories/25855
reference_id
reference_type
scores
url http://secunia.com/advisories/25855
11
reference_url http://secunia.com/advisories/25860
reference_id
reference_type
scores
url http://secunia.com/advisories/25860
12
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
13
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
14
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
15
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
16
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
17
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
18
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
19
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
20
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
23
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
24
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
25
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35109
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35109
26
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806
28
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
29
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
30
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
31
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
33
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
34
reference_url http://www.securityfocus.com/bid/24651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24651
35
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
36
reference_url http://www.vupen.com/english/advisories/2007/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2336
37
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=276791
reference_id 276791
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=276791
39
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
40
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3473
reference_id CVE-2007-3473
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3473
43
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30251.c
reference_id CVE-2007-3473;OSVDB-37744
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30251.c
44
reference_url https://www.securityfocus.com/bid/24651/info
reference_id CVE-2007-3473;OSVDB-37744
reference_type exploit
scores
url https://www.securityfocus.com/bid/24651/info
45
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
46
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4ehv-84qa-fubx
5
vulnerability VCID-4eyx-7fmr-r7dm
6
vulnerability VCID-6xda-97rd-9bam
7
vulnerability VCID-6ysv-9bmx-w7df
8
vulnerability VCID-75xx-y3xu-cqe2
9
vulnerability VCID-7rvx-8x2z-7kdm
10
vulnerability VCID-9wvm-w1qk-xycw
11
vulnerability VCID-9zks-j1fv-ukew
12
vulnerability VCID-b878-mmfs-e3g1
13
vulnerability VCID-cr4d-8dhn-gkgq
14
vulnerability VCID-fcm8-f9e6-83b4
15
vulnerability VCID-fwyg-v128-k7c9
16
vulnerability VCID-g1b8-dkd3-j3a2
17
vulnerability VCID-g3zj-r8ag-a7ej
18
vulnerability VCID-habv-tr8c-rucd
19
vulnerability VCID-hwys-fv79-b7d8
20
vulnerability VCID-j52b-eq6b-dqae
21
vulnerability VCID-jhzv-9ey6-gkdz
22
vulnerability VCID-jun7-q9ts-ebfe
23
vulnerability VCID-k6qv-tnq5-ybd7
24
vulnerability VCID-ku2g-q6cg-ayhc
25
vulnerability VCID-m3ve-pf4u-9qhh
26
vulnerability VCID-pnee-e13t-57a2
27
vulnerability VCID-qqe4-4aja-j7dz
28
vulnerability VCID-r7yv-ryzk-z3e8
29
vulnerability VCID-s33d-rhg8-wqej
30
vulnerability VCID-s83u-wk4f-wkfd
31
vulnerability VCID-sszm-mvm2-m7ee
32
vulnerability VCID-tfaf-hb2s-fyb9
33
vulnerability VCID-vya2-pzx7-m7c1
34
vulnerability VCID-x14b-aaj3-nyed
35
vulnerability VCID-x635-b1cj-m7d7
36
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1
aliases CVE-2007-3473
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ek5b-jujn-bqet
18
url VCID-fcm8-f9e6-83b4
vulnerability_id VCID-fcm8-f9e6-83b4
summary
Multiple vulnerabilities have been found in GD, the worst of which
    allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6207.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6207.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6207
reference_id
reference_type
scores
0
value 0.08719
scoring_system epss
scoring_elements 0.92453
published_at 2026-04-01T12:55:00Z
1
value 0.08719
scoring_system epss
scoring_elements 0.9246
published_at 2026-04-02T12:55:00Z
2
value 0.08719
scoring_system epss
scoring_elements 0.92468
published_at 2026-04-04T12:55:00Z
3
value 0.08719
scoring_system epss
scoring_elements 0.92472
published_at 2026-04-07T12:55:00Z
4
value 0.08719
scoring_system epss
scoring_elements 0.92483
published_at 2026-04-08T12:55:00Z
5
value 0.08719
scoring_system epss
scoring_elements 0.92488
published_at 2026-04-09T12:55:00Z
6
value 0.08719
scoring_system epss
scoring_elements 0.92494
published_at 2026-04-13T12:55:00Z
7
value 0.08719
scoring_system epss
scoring_elements 0.92496
published_at 2026-04-12T12:55:00Z
8
value 0.08719
scoring_system epss
scoring_elements 0.92505
published_at 2026-04-16T12:55:00Z
9
value 0.08719
scoring_system epss
scoring_elements 0.92504
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6207
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1359800
reference_id 1359800
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1359800
5
reference_url https://security.gentoo.org/glsa/201612-09
reference_id GLSA-201612-09
reference_type
scores
url https://security.gentoo.org/glsa/201612-09
6
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
7
reference_url https://usn.ubuntu.com/3060-1/
reference_id USN-3060-1
reference_type
scores
url https://usn.ubuntu.com/3060-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-6207
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fcm8-f9e6-83b4
19
url VCID-fwyg-v128-k7c9
vulnerability_id VCID-fwyg-v128-k7c9
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9933.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9933
reference_id
reference_type
scores
0
value 0.11102
scoring_system epss
scoring_elements 0.93424
published_at 2026-04-01T12:55:00Z
1
value 0.11102
scoring_system epss
scoring_elements 0.93484
published_at 2026-04-18T12:55:00Z
2
value 0.11102
scoring_system epss
scoring_elements 0.93459
published_at 2026-04-13T12:55:00Z
3
value 0.11102
scoring_system epss
scoring_elements 0.93478
published_at 2026-04-16T12:55:00Z
4
value 0.11102
scoring_system epss
scoring_elements 0.93432
published_at 2026-04-02T12:55:00Z
5
value 0.11102
scoring_system epss
scoring_elements 0.9344
published_at 2026-04-04T12:55:00Z
6
value 0.11102
scoring_system epss
scoring_elements 0.93441
published_at 2026-04-07T12:55:00Z
7
value 0.11102
scoring_system epss
scoring_elements 0.93449
published_at 2026-04-08T12:55:00Z
8
value 0.11102
scoring_system epss
scoring_elements 0.93452
published_at 2026-04-09T12:55:00Z
9
value 0.11102
scoring_system epss
scoring_elements 0.93457
published_at 2026-04-11T12:55:00Z
10
value 0.11102
scoring_system epss
scoring_elements 0.93458
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9933
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1404723
reference_id 1404723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1404723
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849038
reference_id 849038
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849038
9
reference_url https://security.archlinux.org/ASA-201611-19
reference_id ASA-201611-19
reference_type
scores
url https://security.archlinux.org/ASA-201611-19
10
reference_url https://security.archlinux.org/AVG-58
reference_id AVG-58
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-58
11
reference_url https://access.redhat.com/errata/RHSA-2018:1296
reference_id RHSA-2018:1296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1296
12
reference_url https://usn.ubuntu.com/3213-1/
reference_id USN-3213-1
reference_type
scores
url https://usn.ubuntu.com/3213-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-9933
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwyg-v128-k7c9
20
url VCID-g1b8-dkd3-j3a2
vulnerability_id VCID-g1b8-dkd3-j3a2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10166.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10166
reference_id
reference_type
scores
0
value 0.08333
scoring_system epss
scoring_elements 0.9225
published_at 2026-04-01T12:55:00Z
1
value 0.08333
scoring_system epss
scoring_elements 0.92257
published_at 2026-04-02T12:55:00Z
2
value 0.08333
scoring_system epss
scoring_elements 0.92263
published_at 2026-04-04T12:55:00Z
3
value 0.08333
scoring_system epss
scoring_elements 0.92266
published_at 2026-04-07T12:55:00Z
4
value 0.08333
scoring_system epss
scoring_elements 0.92277
published_at 2026-04-08T12:55:00Z
5
value 0.08333
scoring_system epss
scoring_elements 0.92281
published_at 2026-04-09T12:55:00Z
6
value 0.08333
scoring_system epss
scoring_elements 0.92287
published_at 2026-04-11T12:55:00Z
7
value 0.08333
scoring_system epss
scoring_elements 0.92288
published_at 2026-04-12T12:55:00Z
8
value 0.08333
scoring_system epss
scoring_elements 0.92285
published_at 2026-04-13T12:55:00Z
9
value 0.08333
scoring_system epss
scoring_elements 0.92297
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1418983
reference_id 1418983
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1418983
10
reference_url https://access.redhat.com/errata/RHSA-2019:2519
reference_id RHSA-2019:2519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2519
11
reference_url https://access.redhat.com/errata/RHSA-2019:3299
reference_id RHSA-2019:3299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3299
12
reference_url https://usn.ubuntu.com/3213-1/
reference_id USN-3213-1
reference_type
scores
url https://usn.ubuntu.com/3213-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-10166
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g1b8-dkd3-j3a2
21
url VCID-g3zj-r8ag-a7ej
vulnerability_id VCID-g3zj-r8ag-a7ej
summary read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38115
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39184
published_at 2026-04-18T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39006
published_at 2026-04-01T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39192
published_at 2026-04-02T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39215
published_at 2026-04-04T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39134
published_at 2026-04-07T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39188
published_at 2026-04-08T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39204
published_at 2026-04-09T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39216
published_at 2026-04-11T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39179
published_at 2026-04-12T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.3916
published_at 2026-04-13T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39214
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38115
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991912
reference_id 991912
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991912
3
reference_url https://security.archlinux.org/AVG-2258
reference_id AVG-2258
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2258
4
reference_url https://usn.ubuntu.com/5068-1/
reference_id USN-5068-1
reference_type
scores
url https://usn.ubuntu.com/5068-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.3.3-9
purl pkg:deb/debian/libgd2@2.3.3-9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9
aliases CVE-2021-38115
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g3zj-r8ag-a7ej
22
url VCID-habv-tr8c-rucd
vulnerability_id VCID-habv-tr8c-rucd
summary
Multiple vulnerabilities have been found in GD, the worst of which
    allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6128.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6128.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6128
reference_id
reference_type
scores
0
value 0.12098
scoring_system epss
scoring_elements 0.93758
published_at 2026-04-01T12:55:00Z
1
value 0.12098
scoring_system epss
scoring_elements 0.93767
published_at 2026-04-02T12:55:00Z
2
value 0.12098
scoring_system epss
scoring_elements 0.93777
published_at 2026-04-04T12:55:00Z
3
value 0.12098
scoring_system epss
scoring_elements 0.9378
published_at 2026-04-07T12:55:00Z
4
value 0.12098
scoring_system epss
scoring_elements 0.93789
published_at 2026-04-08T12:55:00Z
5
value 0.12098
scoring_system epss
scoring_elements 0.93791
published_at 2026-04-09T12:55:00Z
6
value 0.12098
scoring_system epss
scoring_elements 0.93796
published_at 2026-04-13T12:55:00Z
7
value 0.12098
scoring_system epss
scoring_elements 0.93818
published_at 2026-04-16T12:55:00Z
8
value 0.12098
scoring_system epss
scoring_elements 0.93823
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6128
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1351603
reference_id 1351603
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1351603
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829062
reference_id 829062
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829062
12
reference_url https://security.gentoo.org/glsa/201612-09
reference_id GLSA-201612-09
reference_type
scores
url https://security.gentoo.org/glsa/201612-09
13
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
14
reference_url https://usn.ubuntu.com/3030-1/
reference_id USN-3030-1
reference_type
scores
url https://usn.ubuntu.com/3030-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-6128
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-habv-tr8c-rucd
23
url VCID-hwys-fv79-b7d8
vulnerability_id VCID-hwys-fv79-b7d8
summary
Multiple vulnerabilities have been found in GD, the worst of which
    allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6132.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6132.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6132
reference_id
reference_type
scores
0
value 0.02125
scoring_system epss
scoring_elements 0.84085
published_at 2026-04-01T12:55:00Z
1
value 0.02125
scoring_system epss
scoring_elements 0.84098
published_at 2026-04-02T12:55:00Z
2
value 0.02125
scoring_system epss
scoring_elements 0.84116
published_at 2026-04-04T12:55:00Z
3
value 0.02125
scoring_system epss
scoring_elements 0.84117
published_at 2026-04-07T12:55:00Z
4
value 0.02125
scoring_system epss
scoring_elements 0.8414
published_at 2026-04-08T12:55:00Z
5
value 0.02125
scoring_system epss
scoring_elements 0.84146
published_at 2026-04-09T12:55:00Z
6
value 0.02125
scoring_system epss
scoring_elements 0.84164
published_at 2026-04-11T12:55:00Z
7
value 0.02125
scoring_system epss
scoring_elements 0.84158
published_at 2026-04-12T12:55:00Z
8
value 0.02125
scoring_system epss
scoring_elements 0.84153
published_at 2026-04-13T12:55:00Z
9
value 0.02125
scoring_system epss
scoring_elements 0.84176
published_at 2026-04-16T12:55:00Z
10
value 0.02125
scoring_system epss
scoring_elements 0.84177
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6132
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1352544
reference_id 1352544
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1352544
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829694
reference_id 829694
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829694
12
reference_url https://security.gentoo.org/glsa/201612-09
reference_id GLSA-201612-09
reference_type
scores
url https://security.gentoo.org/glsa/201612-09
13
reference_url https://usn.ubuntu.com/3060-1/
reference_id USN-3060-1
reference_type
scores
url https://usn.ubuntu.com/3060-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-6132
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hwys-fv79-b7d8
24
url VCID-j15c-u5ty-jug1
vulnerability_id VCID-j15c-u5ty-jug1
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
reference_id
reference_type
scores
url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
1
reference_url http://bugs.libgd.org/?do=details&task_id=89
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=89
2
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
5
reference_url http://osvdb.org/37745
reference_id
reference_type
scores
url http://osvdb.org/37745
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3472.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3472.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3472
reference_id
reference_type
scores
0
value 0.05891
scoring_system epss
scoring_elements 0.90605
published_at 2026-04-16T12:55:00Z
1
value 0.05891
scoring_system epss
scoring_elements 0.90602
published_at 2026-04-18T12:55:00Z
2
value 0.05891
scoring_system epss
scoring_elements 0.90587
published_at 2026-04-13T12:55:00Z
3
value 0.05891
scoring_system epss
scoring_elements 0.90593
published_at 2026-04-12T12:55:00Z
4
value 0.09309
scoring_system epss
scoring_elements 0.9272
published_at 2026-04-01T12:55:00Z
5
value 0.09309
scoring_system epss
scoring_elements 0.92727
published_at 2026-04-02T12:55:00Z
6
value 0.09309
scoring_system epss
scoring_elements 0.92733
published_at 2026-04-04T12:55:00Z
7
value 0.09309
scoring_system epss
scoring_elements 0.9273
published_at 2026-04-07T12:55:00Z
8
value 0.11193
scoring_system epss
scoring_elements 0.93496
published_at 2026-04-11T12:55:00Z
9
value 0.11193
scoring_system epss
scoring_elements 0.9349
published_at 2026-04-09T12:55:00Z
10
value 0.11193
scoring_system epss
scoring_elements 0.93487
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3472
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472
10
reference_url http://secunia.com/advisories/25855
reference_id
reference_type
scores
url http://secunia.com/advisories/25855
11
reference_url http://secunia.com/advisories/25860
reference_id
reference_type
scores
url http://secunia.com/advisories/25860
12
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
13
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
14
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
15
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
16
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
17
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
18
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
19
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
20
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
23
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
24
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
25
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35108
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35108
26
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067
28
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
29
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
30
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
31
reference_url http://www.novell.com/linux/security/advisories/2007_15_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_15_sr.html
32
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
34
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
35
reference_url http://www.securityfocus.com/bid/24651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24651
36
reference_url http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/
reference_id
reference_type
scores
url http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/
37
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
38
reference_url http://www.vupen.com/english/advisories/2007/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2336
39
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=276751
reference_id 276751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=276751
41
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
42
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3472
reference_id CVE-2007-3472
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3472
53
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
54
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4ehv-84qa-fubx
5
vulnerability VCID-4eyx-7fmr-r7dm
6
vulnerability VCID-6xda-97rd-9bam
7
vulnerability VCID-6ysv-9bmx-w7df
8
vulnerability VCID-75xx-y3xu-cqe2
9
vulnerability VCID-7rvx-8x2z-7kdm
10
vulnerability VCID-9wvm-w1qk-xycw
11
vulnerability VCID-9zks-j1fv-ukew
12
vulnerability VCID-b878-mmfs-e3g1
13
vulnerability VCID-cr4d-8dhn-gkgq
14
vulnerability VCID-fcm8-f9e6-83b4
15
vulnerability VCID-fwyg-v128-k7c9
16
vulnerability VCID-g1b8-dkd3-j3a2
17
vulnerability VCID-g3zj-r8ag-a7ej
18
vulnerability VCID-habv-tr8c-rucd
19
vulnerability VCID-hwys-fv79-b7d8
20
vulnerability VCID-j52b-eq6b-dqae
21
vulnerability VCID-jhzv-9ey6-gkdz
22
vulnerability VCID-jun7-q9ts-ebfe
23
vulnerability VCID-k6qv-tnq5-ybd7
24
vulnerability VCID-ku2g-q6cg-ayhc
25
vulnerability VCID-m3ve-pf4u-9qhh
26
vulnerability VCID-pnee-e13t-57a2
27
vulnerability VCID-qqe4-4aja-j7dz
28
vulnerability VCID-r7yv-ryzk-z3e8
29
vulnerability VCID-s33d-rhg8-wqej
30
vulnerability VCID-s83u-wk4f-wkfd
31
vulnerability VCID-sszm-mvm2-m7ee
32
vulnerability VCID-tfaf-hb2s-fyb9
33
vulnerability VCID-vya2-pzx7-m7c1
34
vulnerability VCID-x14b-aaj3-nyed
35
vulnerability VCID-x635-b1cj-m7d7
36
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1
aliases CVE-2007-3472
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j15c-u5ty-jug1
25
url VCID-j52b-eq6b-dqae
vulnerability_id VCID-j52b-eq6b-dqae
summary
Multiple vulnerabilities have been found in GD, the worst of which
    allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2497.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2497.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2497
reference_id
reference_type
scores
0
value 0.12135
scoring_system epss
scoring_elements 0.93778
published_at 2026-04-01T12:55:00Z
1
value 0.12135
scoring_system epss
scoring_elements 0.93787
published_at 2026-04-02T12:55:00Z
2
value 0.12135
scoring_system epss
scoring_elements 0.93797
published_at 2026-04-04T12:55:00Z
3
value 0.12135
scoring_system epss
scoring_elements 0.93801
published_at 2026-04-07T12:55:00Z
4
value 0.12135
scoring_system epss
scoring_elements 0.93809
published_at 2026-04-08T12:55:00Z
5
value 0.12135
scoring_system epss
scoring_elements 0.93812
published_at 2026-04-09T12:55:00Z
6
value 0.12135
scoring_system epss
scoring_elements 0.93817
published_at 2026-04-13T12:55:00Z
7
value 0.12135
scoring_system epss
scoring_elements 0.9384
published_at 2026-04-16T12:55:00Z
8
value 0.12135
scoring_system epss
scoring_elements 0.93845
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2497
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1076676
reference_id 1076676
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1076676
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744719
reference_id 744719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744719
6
reference_url https://security.gentoo.org/glsa/201408-11
reference_id GLSA-201408-11
reference_type
scores
url https://security.gentoo.org/glsa/201408-11
7
reference_url https://security.gentoo.org/glsa/201607-04
reference_id GLSA-201607-04
reference_type
scores
url https://security.gentoo.org/glsa/201607-04
8
reference_url https://access.redhat.com/errata/RHSA-2014:1326
reference_id RHSA-2014:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1326
9
reference_url https://access.redhat.com/errata/RHSA-2014:1327
reference_id RHSA-2014:1327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1327
10
reference_url https://access.redhat.com/errata/RHSA-2014:1765
reference_id RHSA-2014:1765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1765
11
reference_url https://access.redhat.com/errata/RHSA-2014:1766
reference_id RHSA-2014:1766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1766
12
reference_url https://usn.ubuntu.com/2987-1/
reference_id USN-2987-1
reference_type
scores
url https://usn.ubuntu.com/2987-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%2Bdeb7u2
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9wvm-w1qk-xycw
10
vulnerability VCID-9zks-j1fv-ukew
11
vulnerability VCID-b878-mmfs-e3g1
12
vulnerability VCID-cr4d-8dhn-gkgq
13
vulnerability VCID-fcm8-f9e6-83b4
14
vulnerability VCID-fwyg-v128-k7c9
15
vulnerability VCID-g1b8-dkd3-j3a2
16
vulnerability VCID-g3zj-r8ag-a7ej
17
vulnerability VCID-habv-tr8c-rucd
18
vulnerability VCID-hwys-fv79-b7d8
19
vulnerability VCID-j52b-eq6b-dqae
20
vulnerability VCID-jhzv-9ey6-gkdz
21
vulnerability VCID-jun7-q9ts-ebfe
22
vulnerability VCID-k6qv-tnq5-ybd7
23
vulnerability VCID-ku2g-q6cg-ayhc
24
vulnerability VCID-m3ve-pf4u-9qhh
25
vulnerability VCID-pnee-e13t-57a2
26
vulnerability VCID-qqe4-4aja-j7dz
27
vulnerability VCID-r7yv-ryzk-z3e8
28
vulnerability VCID-s33d-rhg8-wqej
29
vulnerability VCID-s83u-wk4f-wkfd
30
vulnerability VCID-sszm-mvm2-m7ee
31
vulnerability VCID-tfaf-hb2s-fyb9
32
vulnerability VCID-vya2-pzx7-m7c1
33
vulnerability VCID-x14b-aaj3-nyed
34
vulnerability VCID-x635-b1cj-m7d7
35
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%252Bdeb7u2
1
url pkg:deb/debian/libgd2@2.1.0-5
purl pkg:deb/debian/libgd2@2.1.0-5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5
aliases CVE-2014-2497
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j52b-eq6b-dqae
26
url VCID-jhzv-9ey6-gkdz
vulnerability_id VCID-jhzv-9ey6-gkdz
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html
1
reference_url http://php.net/ChangeLog-5.php
reference_id
reference_type
scores
url http://php.net/ChangeLog-5.php
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-2750.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2750.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8874.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8874.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8874
reference_id
reference_type
scores
0
value 0.03775
scoring_system epss
scoring_elements 0.88065
published_at 2026-04-18T12:55:00Z
1
value 0.03775
scoring_system epss
scoring_elements 0.88054
published_at 2026-04-13T12:55:00Z
2
value 0.03775
scoring_system epss
scoring_elements 0.88067
published_at 2026-04-16T12:55:00Z
3
value 0.03775
scoring_system epss
scoring_elements 0.87995
published_at 2026-04-01T12:55:00Z
4
value 0.03775
scoring_system epss
scoring_elements 0.88005
published_at 2026-04-02T12:55:00Z
5
value 0.03775
scoring_system epss
scoring_elements 0.88019
published_at 2026-04-04T12:55:00Z
6
value 0.03775
scoring_system epss
scoring_elements 0.88024
published_at 2026-04-07T12:55:00Z
7
value 0.03775
scoring_system epss
scoring_elements 0.88044
published_at 2026-04-08T12:55:00Z
8
value 0.03775
scoring_system epss
scoring_elements 0.8805
published_at 2026-04-09T12:55:00Z
9
value 0.03775
scoring_system epss
scoring_elements 0.8806
published_at 2026-04-11T12:55:00Z
10
value 0.03775
scoring_system epss
scoring_elements 0.88053
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8874
5
reference_url https://bugs.php.net/bug.php?id=66387
reference_id
reference_type
scores
url https://bugs.php.net/bug.php?id=66387
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
11
reference_url http://www.debian.org/security/2016/dsa-3587
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3587
12
reference_url http://www.ubuntu.com/usn/USN-2987-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2987-1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1336772
reference_id 1336772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1336772
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824627
reference_id 824627
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824627
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8874
reference_id CVE-2015-8874
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8874
18
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
19
reference_url https://usn.ubuntu.com/2987-1/
reference_id USN-2987-1
reference_type
scores
url https://usn.ubuntu.com/2987-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2015-8874
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jhzv-9ey6-gkdz
27
url VCID-jun7-q9ts-ebfe
vulnerability_id VCID-jun7-q9ts-ebfe
summary In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says "In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for development and testing purposes.'
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6363
reference_id
reference_type
scores
0
value 0.00425
scoring_system epss
scoring_elements 0.62096
published_at 2026-04-01T12:55:00Z
1
value 0.00425
scoring_system epss
scoring_elements 0.62156
published_at 2026-04-02T12:55:00Z
2
value 0.00425
scoring_system epss
scoring_elements 0.62187
published_at 2026-04-04T12:55:00Z
3
value 0.00425
scoring_system epss
scoring_elements 0.62155
published_at 2026-04-07T12:55:00Z
4
value 0.00425
scoring_system epss
scoring_elements 0.62205
published_at 2026-04-08T12:55:00Z
5
value 0.00425
scoring_system epss
scoring_elements 0.62222
published_at 2026-04-09T12:55:00Z
6
value 0.00425
scoring_system epss
scoring_elements 0.6224
published_at 2026-04-11T12:55:00Z
7
value 0.00425
scoring_system epss
scoring_elements 0.6223
published_at 2026-04-12T12:55:00Z
8
value 0.00425
scoring_system epss
scoring_elements 0.62209
published_at 2026-04-13T12:55:00Z
9
value 0.00425
scoring_system epss
scoring_elements 0.62255
published_at 2026-04-16T12:55:00Z
10
value 0.00425
scoring_system epss
scoring_elements 0.62262
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6363
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363
2
reference_url https://usn.ubuntu.com/5068-1/
reference_id USN-5068-1
reference_type
scores
url https://usn.ubuntu.com/5068-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.3.0-2
purl pkg:deb/debian/libgd2@2.3.0-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g3zj-r8ag-a7ej
1
vulnerability VCID-qqe4-4aja-j7dz
2
vulnerability VCID-s83u-wk4f-wkfd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2
aliases CVE-2017-6363
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jun7-q9ts-ebfe
28
url VCID-k6qv-tnq5-ybd7
vulnerability_id VCID-k6qv-tnq5-ybd7
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7456.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7456
reference_id
reference_type
scores
0
value 0.01328
scoring_system epss
scoring_elements 0.79885
published_at 2026-04-01T12:55:00Z
1
value 0.01328
scoring_system epss
scoring_elements 0.79891
published_at 2026-04-02T12:55:00Z
2
value 0.01328
scoring_system epss
scoring_elements 0.79912
published_at 2026-04-04T12:55:00Z
3
value 0.01328
scoring_system epss
scoring_elements 0.799
published_at 2026-04-07T12:55:00Z
4
value 0.01328
scoring_system epss
scoring_elements 0.79929
published_at 2026-04-08T12:55:00Z
5
value 0.01328
scoring_system epss
scoring_elements 0.79938
published_at 2026-04-09T12:55:00Z
6
value 0.01328
scoring_system epss
scoring_elements 0.79957
published_at 2026-04-11T12:55:00Z
7
value 0.01328
scoring_system epss
scoring_elements 0.79941
published_at 2026-04-12T12:55:00Z
8
value 0.01328
scoring_system epss
scoring_elements 0.79933
published_at 2026-04-13T12:55:00Z
9
value 0.01328
scoring_system epss
scoring_elements 0.79962
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1340433
reference_id 1340433
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1340433
19
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
20
reference_url https://usn.ubuntu.com/3030-1/
reference_id USN-3030-1
reference_type
scores
url https://usn.ubuntu.com/3030-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2013-7456
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6qv-tnq5-ybd7
29
url VCID-ku2g-q6cg-ayhc
vulnerability_id VCID-ku2g-q6cg-ayhc
summary security update
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-2750.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2750.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8877.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8877.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8877
reference_id
reference_type
scores
0
value 0.02317
scoring_system epss
scoring_elements 0.8481
published_at 2026-04-18T12:55:00Z
1
value 0.02317
scoring_system epss
scoring_elements 0.84809
published_at 2026-04-16T12:55:00Z
2
value 0.02317
scoring_system epss
scoring_elements 0.84714
published_at 2026-04-01T12:55:00Z
3
value 0.02317
scoring_system epss
scoring_elements 0.84729
published_at 2026-04-02T12:55:00Z
4
value 0.02317
scoring_system epss
scoring_elements 0.84748
published_at 2026-04-04T12:55:00Z
5
value 0.02317
scoring_system epss
scoring_elements 0.84751
published_at 2026-04-07T12:55:00Z
6
value 0.02317
scoring_system epss
scoring_elements 0.84773
published_at 2026-04-08T12:55:00Z
7
value 0.02317
scoring_system epss
scoring_elements 0.84779
published_at 2026-04-09T12:55:00Z
8
value 0.02317
scoring_system epss
scoring_elements 0.84797
published_at 2026-04-11T12:55:00Z
9
value 0.02317
scoring_system epss
scoring_elements 0.84793
published_at 2026-04-12T12:55:00Z
10
value 0.02317
scoring_system epss
scoring_elements 0.84788
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8877
3
reference_url https://bugs.php.net/bug.php?id=70064
reference_id
reference_type
scores
url https://bugs.php.net/bug.php?id=70064
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877
7
reference_url https://github.com/libgd/libgd/commit/4751b606fa38edc456d627140898a7ec679fcc24
reference_id
reference_type
scores
url https://github.com/libgd/libgd/commit/4751b606fa38edc456d627140898a7ec679fcc24
8
reference_url https://github.com/libgd/libgd/issues/173
reference_id
reference_type
scores
url https://github.com/libgd/libgd/issues/173
9
reference_url http://www.debian.org/security/2016/dsa-3587
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3587
10
reference_url http://www.php.net/ChangeLog-5.php
reference_id
reference_type
scores
url http://www.php.net/ChangeLog-5.php
11
reference_url http://www.ubuntu.com/usn/USN-2987-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2987-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1338907
reference_id 1338907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1338907
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8877
reference_id CVE-2015-8877
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8877
16
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
17
reference_url https://usn.ubuntu.com/2987-1/
reference_id USN-2987-1
reference_type
scores
url https://usn.ubuntu.com/2987-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2015-8877
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ku2g-q6cg-ayhc
30
url VCID-m3ve-pf4u-9qhh
vulnerability_id VCID-m3ve-pf4u-9qhh
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6161.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6161
reference_id
reference_type
scores
0
value 0.00904
scoring_system epss
scoring_elements 0.75659
published_at 2026-04-01T12:55:00Z
1
value 0.00904
scoring_system epss
scoring_elements 0.75662
published_at 2026-04-02T12:55:00Z
2
value 0.00904
scoring_system epss
scoring_elements 0.75693
published_at 2026-04-04T12:55:00Z
3
value 0.00904
scoring_system epss
scoring_elements 0.75673
published_at 2026-04-07T12:55:00Z
4
value 0.00904
scoring_system epss
scoring_elements 0.75707
published_at 2026-04-08T12:55:00Z
5
value 0.00904
scoring_system epss
scoring_elements 0.75718
published_at 2026-04-09T12:55:00Z
6
value 0.00904
scoring_system epss
scoring_elements 0.75742
published_at 2026-04-11T12:55:00Z
7
value 0.00904
scoring_system epss
scoring_elements 0.75723
published_at 2026-04-12T12:55:00Z
8
value 0.00904
scoring_system epss
scoring_elements 0.75717
published_at 2026-04-13T12:55:00Z
9
value 0.00904
scoring_system epss
scoring_elements 0.75755
published_at 2026-04-16T12:55:00Z
10
value 0.00904
scoring_system epss
scoring_elements 0.75758
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6161
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1353550
reference_id 1353550
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1353550
11
reference_url https://usn.ubuntu.com/3030-1/
reference_id USN-3030-1
reference_type
scores
url https://usn.ubuntu.com/3030-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-6161
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m3ve-pf4u-9qhh
31
url VCID-n7w7-16vs-z3gg
vulnerability_id VCID-n7w7-16vs-z3gg
summary gd: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5767.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5767.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5767
reference_id
reference_type
scores
0
value 0.04623
scoring_system epss
scoring_elements 0.89223
published_at 2026-04-01T12:55:00Z
1
value 0.04623
scoring_system epss
scoring_elements 0.89229
published_at 2026-04-02T12:55:00Z
2
value 0.04623
scoring_system epss
scoring_elements 0.89244
published_at 2026-04-04T12:55:00Z
3
value 0.04623
scoring_system epss
scoring_elements 0.89246
published_at 2026-04-07T12:55:00Z
4
value 0.04623
scoring_system epss
scoring_elements 0.89264
published_at 2026-04-08T12:55:00Z
5
value 0.04623
scoring_system epss
scoring_elements 0.89269
published_at 2026-04-09T12:55:00Z
6
value 0.04623
scoring_system epss
scoring_elements 0.89278
published_at 2026-04-11T12:55:00Z
7
value 0.04623
scoring_system epss
scoring_elements 0.89274
published_at 2026-04-12T12:55:00Z
8
value 0.04623
scoring_system epss
scoring_elements 0.8927
published_at 2026-04-13T12:55:00Z
9
value 0.04623
scoring_system epss
scoring_elements 0.89284
published_at 2026-04-16T12:55:00Z
10
value 0.04623
scoring_system epss
scoring_elements 0.89283
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5767
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1351069
reference_id 1351069
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1351069
5
reference_url https://access.redhat.com/errata/RHSA-2016:2598
reference_id RHSA-2016:2598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2598
6
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4ehv-84qa-fubx
5
vulnerability VCID-4eyx-7fmr-r7dm
6
vulnerability VCID-6xda-97rd-9bam
7
vulnerability VCID-6ysv-9bmx-w7df
8
vulnerability VCID-75xx-y3xu-cqe2
9
vulnerability VCID-7rvx-8x2z-7kdm
10
vulnerability VCID-9wvm-w1qk-xycw
11
vulnerability VCID-9zks-j1fv-ukew
12
vulnerability VCID-b878-mmfs-e3g1
13
vulnerability VCID-cr4d-8dhn-gkgq
14
vulnerability VCID-fcm8-f9e6-83b4
15
vulnerability VCID-fwyg-v128-k7c9
16
vulnerability VCID-g1b8-dkd3-j3a2
17
vulnerability VCID-g3zj-r8ag-a7ej
18
vulnerability VCID-habv-tr8c-rucd
19
vulnerability VCID-hwys-fv79-b7d8
20
vulnerability VCID-j52b-eq6b-dqae
21
vulnerability VCID-jhzv-9ey6-gkdz
22
vulnerability VCID-jun7-q9ts-ebfe
23
vulnerability VCID-k6qv-tnq5-ybd7
24
vulnerability VCID-ku2g-q6cg-ayhc
25
vulnerability VCID-m3ve-pf4u-9qhh
26
vulnerability VCID-pnee-e13t-57a2
27
vulnerability VCID-qqe4-4aja-j7dz
28
vulnerability VCID-r7yv-ryzk-z3e8
29
vulnerability VCID-s33d-rhg8-wqej
30
vulnerability VCID-s83u-wk4f-wkfd
31
vulnerability VCID-sszm-mvm2-m7ee
32
vulnerability VCID-tfaf-hb2s-fyb9
33
vulnerability VCID-vya2-pzx7-m7c1
34
vulnerability VCID-x14b-aaj3-nyed
35
vulnerability VCID-x635-b1cj-m7d7
36
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1
aliases CVE-2016-5767
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7w7-16vs-z3gg
32
url VCID-pnee-e13t-57a2
vulnerability_id VCID-pnee-e13t-57a2
summary
Multiple vulnerabilities have been found in GD, the worst of which
    allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7568.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7568.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7568
reference_id
reference_type
scores
0
value 0.03421
scoring_system epss
scoring_elements 0.87398
published_at 2026-04-01T12:55:00Z
1
value 0.03421
scoring_system epss
scoring_elements 0.87469
published_at 2026-04-18T12:55:00Z
2
value 0.03421
scoring_system epss
scoring_elements 0.87452
published_at 2026-04-13T12:55:00Z
3
value 0.03421
scoring_system epss
scoring_elements 0.87466
published_at 2026-04-16T12:55:00Z
4
value 0.03421
scoring_system epss
scoring_elements 0.87408
published_at 2026-04-02T12:55:00Z
5
value 0.03421
scoring_system epss
scoring_elements 0.87422
published_at 2026-04-04T12:55:00Z
6
value 0.03421
scoring_system epss
scoring_elements 0.87423
published_at 2026-04-07T12:55:00Z
7
value 0.03421
scoring_system epss
scoring_elements 0.87442
published_at 2026-04-08T12:55:00Z
8
value 0.03421
scoring_system epss
scoring_elements 0.87449
published_at 2026-04-09T12:55:00Z
9
value 0.03421
scoring_system epss
scoring_elements 0.8746
published_at 2026-04-11T12:55:00Z
10
value 0.03421
scoring_system epss
scoring_elements 0.87456
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7568
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1380450
reference_id 1380450
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1380450
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839659
reference_id 839659
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839659
8
reference_url https://security.archlinux.org/ASA-201611-19
reference_id ASA-201611-19
reference_type
scores
url https://security.archlinux.org/ASA-201611-19
9
reference_url https://security.archlinux.org/AVG-58
reference_id AVG-58
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-58
10
reference_url https://security.gentoo.org/glsa/201612-09
reference_id GLSA-201612-09
reference_type
scores
url https://security.gentoo.org/glsa/201612-09
11
reference_url https://usn.ubuntu.com/3117-1/
reference_id USN-3117-1
reference_type
scores
url https://usn.ubuntu.com/3117-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-7568
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pnee-e13t-57a2
33
url VCID-qqe4-4aja-j7dz
vulnerability_id VCID-qqe4-4aja-j7dz
summary gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka LibGD) through 2.3.2 has a double free. NOTE: the vendor's position is "The GD2 image format is a proprietary image format of libgd. It has to be regarded as being obsolete, and should only be used for development and testing purposes.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-40145
reference_id
reference_type
scores
0
value 0.00426
scoring_system epss
scoring_elements 0.62333
published_at 2026-04-18T12:55:00Z
1
value 0.00426
scoring_system epss
scoring_elements 0.62312
published_at 2026-04-11T12:55:00Z
2
value 0.00426
scoring_system epss
scoring_elements 0.62302
published_at 2026-04-12T12:55:00Z
3
value 0.00426
scoring_system epss
scoring_elements 0.62281
published_at 2026-04-13T12:55:00Z
4
value 0.00426
scoring_system epss
scoring_elements 0.62326
published_at 2026-04-16T12:55:00Z
5
value 0.00426
scoring_system epss
scoring_elements 0.62226
published_at 2026-04-07T12:55:00Z
6
value 0.00426
scoring_system epss
scoring_elements 0.62276
published_at 2026-04-08T12:55:00Z
7
value 0.00426
scoring_system epss
scoring_elements 0.62293
published_at 2026-04-09T12:55:00Z
8
value 0.00537
scoring_system epss
scoring_elements 0.67494
published_at 2026-04-02T12:55:00Z
9
value 0.00537
scoring_system epss
scoring_elements 0.67515
published_at 2026-04-04T12:55:00Z
10
value 0.00537
scoring_system epss
scoring_elements 0.67458
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-40145
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145
2
reference_url https://security.archlinux.org/AVG-2258
reference_id AVG-2258
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2258
3
reference_url https://usn.ubuntu.com/5068-1/
reference_id USN-5068-1
reference_type
scores
url https://usn.ubuntu.com/5068-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.3.3-9
purl pkg:deb/debian/libgd2@2.3.3-9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9
aliases CVE-2021-40145
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qqe4-4aja-j7dz
34
url VCID-r7yv-ryzk-z3e8
vulnerability_id VCID-r7yv-ryzk-z3e8
summary
Multiple vulnerabilities have been found in GD, the worst of which
    could result in the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000222.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000222.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000222
reference_id
reference_type
scores
0
value 0.00897
scoring_system epss
scoring_elements 0.75675
published_at 2026-04-18T12:55:00Z
1
value 0.00897
scoring_system epss
scoring_elements 0.75623
published_at 2026-04-08T12:55:00Z
2
value 0.00897
scoring_system epss
scoring_elements 0.75633
published_at 2026-04-13T12:55:00Z
3
value 0.00897
scoring_system epss
scoring_elements 0.75658
published_at 2026-04-11T12:55:00Z
4
value 0.00897
scoring_system epss
scoring_elements 0.7564
published_at 2026-04-12T12:55:00Z
5
value 0.00897
scoring_system epss
scoring_elements 0.75671
published_at 2026-04-16T12:55:00Z
6
value 0.00897
scoring_system epss
scoring_elements 0.75588
published_at 2026-04-07T12:55:00Z
7
value 0.01215
scoring_system epss
scoring_elements 0.78981
published_at 2026-04-02T12:55:00Z
8
value 0.01215
scoring_system epss
scoring_elements 0.79007
published_at 2026-04-04T12:55:00Z
9
value 0.01215
scoring_system epss
scoring_elements 0.78975
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000222
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1621953
reference_id 1621953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1621953
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906886
reference_id 906886
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906886
6
reference_url https://security.archlinux.org/AVG-865
reference_id AVG-865
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-865
7
reference_url https://security.gentoo.org/glsa/201903-18
reference_id GLSA-201903-18
reference_type
scores
url https://security.gentoo.org/glsa/201903-18
8
reference_url https://usn.ubuntu.com/3755-1/
reference_id USN-3755-1
reference_type
scores
url https://usn.ubuntu.com/3755-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.2.5-5.2
purl pkg:deb/debian/libgd2@2.2.5-5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g3zj-r8ag-a7ej
1
vulnerability VCID-jun7-q9ts-ebfe
2
vulnerability VCID-qqe4-4aja-j7dz
3
vulnerability VCID-s83u-wk4f-wkfd
4
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2
aliases CVE-2018-1000222
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r7yv-ryzk-z3e8
35
url VCID-s33d-rhg8-wqej
vulnerability_id VCID-s33d-rhg8-wqej
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6905.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6905.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6905
reference_id
reference_type
scores
0
value 0.01408
scoring_system epss
scoring_elements 0.80427
published_at 2026-04-01T12:55:00Z
1
value 0.01408
scoring_system epss
scoring_elements 0.80434
published_at 2026-04-02T12:55:00Z
2
value 0.01408
scoring_system epss
scoring_elements 0.80455
published_at 2026-04-04T12:55:00Z
3
value 0.01408
scoring_system epss
scoring_elements 0.80444
published_at 2026-04-07T12:55:00Z
4
value 0.01408
scoring_system epss
scoring_elements 0.80474
published_at 2026-04-08T12:55:00Z
5
value 0.01408
scoring_system epss
scoring_elements 0.80484
published_at 2026-04-09T12:55:00Z
6
value 0.01408
scoring_system epss
scoring_elements 0.80502
published_at 2026-04-11T12:55:00Z
7
value 0.01408
scoring_system epss
scoring_elements 0.80487
published_at 2026-04-12T12:55:00Z
8
value 0.01408
scoring_system epss
scoring_elements 0.8048
published_at 2026-04-13T12:55:00Z
9
value 0.01408
scoring_system epss
scoring_elements 0.80509
published_at 2026-04-16T12:55:00Z
10
value 0.01408
scoring_system epss
scoring_elements 0.8051
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6905
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1356485
reference_id 1356485
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1356485
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-6905
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s33d-rhg8-wqej
36
url VCID-s83u-wk4f-wkfd
vulnerability_id VCID-s83u-wk4f-wkfd
summary The GD Graphics Library (aka LibGD) through 2.3.2 has an out-of-bounds read because of the lack of certain gdGetBuf and gdPutBuf return value checks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-40812
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.32895
published_at 2026-04-01T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32888
published_at 2026-04-07T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32935
published_at 2026-04-08T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32964
published_at 2026-04-09T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32967
published_at 2026-04-11T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32929
published_at 2026-04-12T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32903
published_at 2026-04-13T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32944
published_at 2026-04-16T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32922
published_at 2026-04-18T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.33025
published_at 2026-04-02T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.33058
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-40812
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9
reference_id 6f5136821be86e7068fcdf651ae9420b5d42e9a9
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T16:15:07Z/
url https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9
4
reference_url https://github.com/libgd/libgd/issues/750#issuecomment-914872385
reference_id 750#issuecomment-914872385
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T16:15:07Z/
url https://github.com/libgd/libgd/issues/750#issuecomment-914872385
5
reference_url https://security.archlinux.org/AVG-2258
reference_id AVG-2258
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2258
6
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T16:15:07Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00003.html
7
reference_url https://usn.ubuntu.com/7112-1/
reference_id USN-7112-1
reference_type
scores
url https://usn.ubuntu.com/7112-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.3.3-9
purl pkg:deb/debian/libgd2@2.3.3-9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9
aliases CVE-2021-40812
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s83u-wk4f-wkfd
37
url VCID-sszm-mvm2-m7ee
vulnerability_id VCID-sszm-mvm2-m7ee
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11038.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11038.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11038
reference_id
reference_type
scores
0
value 0.1054
scoring_system epss
scoring_elements 0.93287
published_at 2026-04-18T12:55:00Z
1
value 0.1054
scoring_system epss
scoring_elements 0.93262
published_at 2026-04-12T12:55:00Z
2
value 0.1054
scoring_system epss
scoring_elements 0.93264
published_at 2026-04-13T12:55:00Z
3
value 0.1054
scoring_system epss
scoring_elements 0.93282
published_at 2026-04-16T12:55:00Z
4
value 0.1054
scoring_system epss
scoring_elements 0.93249
published_at 2026-04-04T12:55:00Z
5
value 0.1054
scoring_system epss
scoring_elements 0.93248
published_at 2026-04-07T12:55:00Z
6
value 0.1054
scoring_system epss
scoring_elements 0.93256
published_at 2026-04-08T12:55:00Z
7
value 0.1054
scoring_system epss
scoring_elements 0.93261
published_at 2026-04-09T12:55:00Z
8
value 0.1054
scoring_system epss
scoring_elements 0.93265
published_at 2026-04-11T12:55:00Z
9
value 0.10719
scoring_system epss
scoring_elements 0.93303
published_at 2026-04-02T12:55:00Z
10
value 0.10719
scoring_system epss
scoring_elements 0.93295
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11038
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11034
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11035
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11036
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11039
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11040
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11041
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11042
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1724149
reference_id 1724149
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1724149
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929821
reference_id 929821
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929821
14
reference_url https://access.redhat.com/errata/RHSA-2019:2519
reference_id RHSA-2019:2519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2519
15
reference_url https://access.redhat.com/errata/RHSA-2019:3299
reference_id RHSA-2019:3299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3299
16
reference_url https://usn.ubuntu.com/4316-1/
reference_id USN-4316-1
reference_type
scores
url https://usn.ubuntu.com/4316-1/
17
reference_url https://usn.ubuntu.com/4316-2/
reference_id USN-4316-2
reference_type
scores
url https://usn.ubuntu.com/4316-2/
fixed_packages
0
url pkg:deb/debian/libgd2@2.2.5-5.2
purl pkg:deb/debian/libgd2@2.2.5-5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g3zj-r8ag-a7ej
1
vulnerability VCID-jun7-q9ts-ebfe
2
vulnerability VCID-qqe4-4aja-j7dz
3
vulnerability VCID-s83u-wk4f-wkfd
4
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2
aliases CVE-2019-11038
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sszm-mvm2-m7ee
38
url VCID-svg5-jd8s-mbb5
vulnerability_id VCID-svg5-jd8s-mbb5
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3996
reference_id
reference_type
scores
0
value 0.09573
scoring_system epss
scoring_elements 0.92838
published_at 2026-04-01T12:55:00Z
1
value 0.09573
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-02T12:55:00Z
2
value 0.09573
scoring_system epss
scoring_elements 0.92849
published_at 2026-04-04T12:55:00Z
3
value 0.09573
scoring_system epss
scoring_elements 0.92847
published_at 2026-04-07T12:55:00Z
4
value 0.09573
scoring_system epss
scoring_elements 0.92856
published_at 2026-04-08T12:55:00Z
5
value 0.09573
scoring_system epss
scoring_elements 0.92859
published_at 2026-04-09T12:55:00Z
6
value 0.09573
scoring_system epss
scoring_elements 0.92864
published_at 2026-04-13T12:55:00Z
7
value 0.09573
scoring_system epss
scoring_elements 0.92874
published_at 2026-04-16T12:55:00Z
8
value 0.09573
scoring_system epss
scoring_elements 0.92875
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3996
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278031
reference_id 278031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278031
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456
reference_id 443456
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
reference_id 601525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
6
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
7
reference_url https://access.redhat.com/errata/RHSA-2007:0888
reference_id RHSA-2007:0888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0888
8
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
9
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
10
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
11
reference_url https://usn.ubuntu.com/557-1/
reference_id USN-557-1
reference_type
scores
url https://usn.ubuntu.com/557-1/
12
reference_url https://usn.ubuntu.com/720-1/
reference_id USN-720-1
reference_type
scores
url https://usn.ubuntu.com/720-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4ehv-84qa-fubx
5
vulnerability VCID-4eyx-7fmr-r7dm
6
vulnerability VCID-6xda-97rd-9bam
7
vulnerability VCID-6ysv-9bmx-w7df
8
vulnerability VCID-75xx-y3xu-cqe2
9
vulnerability VCID-7rvx-8x2z-7kdm
10
vulnerability VCID-9wvm-w1qk-xycw
11
vulnerability VCID-9zks-j1fv-ukew
12
vulnerability VCID-b878-mmfs-e3g1
13
vulnerability VCID-cr4d-8dhn-gkgq
14
vulnerability VCID-fcm8-f9e6-83b4
15
vulnerability VCID-fwyg-v128-k7c9
16
vulnerability VCID-g1b8-dkd3-j3a2
17
vulnerability VCID-g3zj-r8ag-a7ej
18
vulnerability VCID-habv-tr8c-rucd
19
vulnerability VCID-hwys-fv79-b7d8
20
vulnerability VCID-j52b-eq6b-dqae
21
vulnerability VCID-jhzv-9ey6-gkdz
22
vulnerability VCID-jun7-q9ts-ebfe
23
vulnerability VCID-k6qv-tnq5-ybd7
24
vulnerability VCID-ku2g-q6cg-ayhc
25
vulnerability VCID-m3ve-pf4u-9qhh
26
vulnerability VCID-pnee-e13t-57a2
27
vulnerability VCID-qqe4-4aja-j7dz
28
vulnerability VCID-r7yv-ryzk-z3e8
29
vulnerability VCID-s33d-rhg8-wqej
30
vulnerability VCID-s83u-wk4f-wkfd
31
vulnerability VCID-sszm-mvm2-m7ee
32
vulnerability VCID-tfaf-hb2s-fyb9
33
vulnerability VCID-vya2-pzx7-m7c1
34
vulnerability VCID-x14b-aaj3-nyed
35
vulnerability VCID-x635-b1cj-m7d7
36
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1
aliases CVE-2007-3996
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-svg5-jd8s-mbb5
39
url VCID-szfb-zfrk-4qha
vulnerability_id VCID-szfb-zfrk-4qha
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url http://bugs.libgd.org/?do=details&task_id=48
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=48
1
reference_url http://bugs.php.net/bug.php?id=40578
reference_id
reference_type
scores
url http://bugs.php.net/bug.php?id=40578
2
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
5
reference_url http://osvdb.org/37740
reference_id
reference_type
scores
url http://osvdb.org/37740
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3478.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3478.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3478
reference_id
reference_type
scores
0
value 0.12107
scoring_system epss
scoring_elements 0.93771
published_at 2026-04-02T12:55:00Z
1
value 0.12107
scoring_system epss
scoring_elements 0.9378
published_at 2026-04-04T12:55:00Z
2
value 0.12107
scoring_system epss
scoring_elements 0.93783
published_at 2026-04-07T12:55:00Z
3
value 0.12107
scoring_system epss
scoring_elements 0.93761
published_at 2026-04-01T12:55:00Z
4
value 0.14445
scoring_system epss
scoring_elements 0.94433
published_at 2026-04-13T12:55:00Z
5
value 0.14445
scoring_system epss
scoring_elements 0.94448
published_at 2026-04-16T12:55:00Z
6
value 0.14445
scoring_system epss
scoring_elements 0.94452
published_at 2026-04-18T12:55:00Z
7
value 0.14445
scoring_system epss
scoring_elements 0.94425
published_at 2026-04-08T12:55:00Z
8
value 0.14445
scoring_system epss
scoring_elements 0.94428
published_at 2026-04-09T12:55:00Z
9
value 0.14445
scoring_system epss
scoring_elements 0.94431
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3478
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3478
10
reference_url http://secunia.com/advisories/25855
reference_id
reference_type
scores
url http://secunia.com/advisories/25855
11
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
12
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
13
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
14
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
15
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
16
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
17
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
18
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
19
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
20
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
21
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
22
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
23
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
24
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
27
reference_url http://www.novell.com/linux/security/advisories/2007_15_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_15_sr.html
28
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
29
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
30
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
31
reference_url http://www.vupen.com/english/advisories/2007/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2336
32
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277231
reference_id 277231
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277231
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3478
reference_id CVE-2007-3478
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3478
36
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4ehv-84qa-fubx
5
vulnerability VCID-4eyx-7fmr-r7dm
6
vulnerability VCID-6xda-97rd-9bam
7
vulnerability VCID-6ysv-9bmx-w7df
8
vulnerability VCID-75xx-y3xu-cqe2
9
vulnerability VCID-7rvx-8x2z-7kdm
10
vulnerability VCID-9wvm-w1qk-xycw
11
vulnerability VCID-9zks-j1fv-ukew
12
vulnerability VCID-b878-mmfs-e3g1
13
vulnerability VCID-cr4d-8dhn-gkgq
14
vulnerability VCID-fcm8-f9e6-83b4
15
vulnerability VCID-fwyg-v128-k7c9
16
vulnerability VCID-g1b8-dkd3-j3a2
17
vulnerability VCID-g3zj-r8ag-a7ej
18
vulnerability VCID-habv-tr8c-rucd
19
vulnerability VCID-hwys-fv79-b7d8
20
vulnerability VCID-j52b-eq6b-dqae
21
vulnerability VCID-jhzv-9ey6-gkdz
22
vulnerability VCID-jun7-q9ts-ebfe
23
vulnerability VCID-k6qv-tnq5-ybd7
24
vulnerability VCID-ku2g-q6cg-ayhc
25
vulnerability VCID-m3ve-pf4u-9qhh
26
vulnerability VCID-pnee-e13t-57a2
27
vulnerability VCID-qqe4-4aja-j7dz
28
vulnerability VCID-r7yv-ryzk-z3e8
29
vulnerability VCID-s33d-rhg8-wqej
30
vulnerability VCID-s83u-wk4f-wkfd
31
vulnerability VCID-sszm-mvm2-m7ee
32
vulnerability VCID-tfaf-hb2s-fyb9
33
vulnerability VCID-vya2-pzx7-m7c1
34
vulnerability VCID-x14b-aaj3-nyed
35
vulnerability VCID-x635-b1cj-m7d7
36
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1
aliases CVE-2007-3478
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-szfb-zfrk-4qha
40
url VCID-tfaf-hb2s-fyb9
vulnerability_id VCID-tfaf-hb2s-fyb9
summary
Multiple vulnerabilities have been found in GD, the worst of which
    allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5766.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5766.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5766
reference_id
reference_type
scores
0
value 0.16232
scoring_system epss
scoring_elements 0.94782
published_at 2026-04-01T12:55:00Z
1
value 0.16232
scoring_system epss
scoring_elements 0.94792
published_at 2026-04-02T12:55:00Z
2
value 0.16232
scoring_system epss
scoring_elements 0.94795
published_at 2026-04-04T12:55:00Z
3
value 0.16232
scoring_system epss
scoring_elements 0.94797
published_at 2026-04-07T12:55:00Z
4
value 0.16232
scoring_system epss
scoring_elements 0.94806
published_at 2026-04-08T12:55:00Z
5
value 0.16232
scoring_system epss
scoring_elements 0.9481
published_at 2026-04-09T12:55:00Z
6
value 0.16232
scoring_system epss
scoring_elements 0.94814
published_at 2026-04-11T12:55:00Z
7
value 0.16232
scoring_system epss
scoring_elements 0.94818
published_at 2026-04-12T12:55:00Z
8
value 0.16232
scoring_system epss
scoring_elements 0.94819
published_at 2026-04-13T12:55:00Z
9
value 0.16232
scoring_system epss
scoring_elements 0.94825
published_at 2026-04-16T12:55:00Z
10
value 0.16232
scoring_system epss
scoring_elements 0.94828
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5766
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1351068
reference_id 1351068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1351068
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829014
reference_id 829014
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829014
12
reference_url https://security.gentoo.org/glsa/201612-09
reference_id GLSA-201612-09
reference_type
scores
url https://security.gentoo.org/glsa/201612-09
13
reference_url https://access.redhat.com/errata/RHSA-2016:2598
reference_id RHSA-2016:2598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2598
14
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
15
reference_url https://access.redhat.com/errata/RHSA-2020:5443
reference_id RHSA-2020:5443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5443
16
reference_url https://usn.ubuntu.com/3030-1/
reference_id USN-3030-1
reference_type
scores
url https://usn.ubuntu.com/3030-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-5766
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tfaf-hb2s-fyb9
41
url VCID-tttf-2akk-57ez
vulnerability_id VCID-tttf-2akk-57ez
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url http://bugs.libgd.org/?do=details&task_id=86
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=86
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
3
reference_url http://osvdb.org/35788
reference_id
reference_type
scores
url http://osvdb.org/35788
4
reference_url http://osvdb.org/36643
reference_id
reference_type
scores
url http://osvdb.org/36643
5
reference_url http://rhn.redhat.com/errata/RHSA-2007-0889.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0889.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2756
reference_id
reference_type
scores
0
value 0.06829
scoring_system epss
scoring_elements 0.91365
published_at 2026-04-18T12:55:00Z
1
value 0.06829
scoring_system epss
scoring_elements 0.91366
published_at 2026-04-16T12:55:00Z
2
value 0.06829
scoring_system epss
scoring_elements 0.91343
published_at 2026-04-12T12:55:00Z
3
value 0.06829
scoring_system epss
scoring_elements 0.91341
published_at 2026-04-13T12:55:00Z
4
value 0.07124
scoring_system epss
scoring_elements 0.91498
published_at 2026-04-01T12:55:00Z
5
value 0.07124
scoring_system epss
scoring_elements 0.91538
published_at 2026-04-09T12:55:00Z
6
value 0.07124
scoring_system epss
scoring_elements 0.91542
published_at 2026-04-11T12:55:00Z
7
value 0.07124
scoring_system epss
scoring_elements 0.91532
published_at 2026-04-08T12:55:00Z
8
value 0.07124
scoring_system epss
scoring_elements 0.91505
published_at 2026-04-02T12:55:00Z
9
value 0.07124
scoring_system epss
scoring_elements 0.91511
published_at 2026-04-04T12:55:00Z
10
value 0.07124
scoring_system epss
scoring_elements 0.91519
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
9
reference_url http://secunia.com/advisories/25353
reference_id
reference_type
scores
url http://secunia.com/advisories/25353
10
reference_url http://secunia.com/advisories/25362
reference_id
reference_type
scores
url http://secunia.com/advisories/25362
11
reference_url http://secunia.com/advisories/25378
reference_id
reference_type
scores
url http://secunia.com/advisories/25378
12
reference_url http://secunia.com/advisories/25535
reference_id
reference_type
scores
url http://secunia.com/advisories/25535
13
reference_url http://secunia.com/advisories/25575
reference_id
reference_type
scores
url http://secunia.com/advisories/25575
14
reference_url http://secunia.com/advisories/25590
reference_id
reference_type
scores
url http://secunia.com/advisories/25590
15
reference_url http://secunia.com/advisories/25646
reference_id
reference_type
scores
url http://secunia.com/advisories/25646
16
reference_url http://secunia.com/advisories/25657
reference_id
reference_type
scores
url http://secunia.com/advisories/25657
17
reference_url http://secunia.com/advisories/25658
reference_id
reference_type
scores
url http://secunia.com/advisories/25658
18
reference_url http://secunia.com/advisories/25787
reference_id
reference_type
scores
url http://secunia.com/advisories/25787
19
reference_url http://secunia.com/advisories/25855
reference_id
reference_type
scores
url http://secunia.com/advisories/25855
20
reference_url http://secunia.com/advisories/26048
reference_id
reference_type
scores
url http://secunia.com/advisories/26048
21
reference_url http://secunia.com/advisories/26231
reference_id
reference_type
scores
url http://secunia.com/advisories/26231
22
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
23
reference_url http://secunia.com/advisories/26871
reference_id
reference_type
scores
url http://secunia.com/advisories/26871
24
reference_url http://secunia.com/advisories/26895
reference_id
reference_type
scores
url http://secunia.com/advisories/26895
25
reference_url http://secunia.com/advisories/26930
reference_id
reference_type
scores
url http://secunia.com/advisories/26930
26
reference_url http://secunia.com/advisories/26967
reference_id
reference_type
scores
url http://secunia.com/advisories/26967
27
reference_url http://secunia.com/advisories/27037
reference_id
reference_type
scores
url http://secunia.com/advisories/27037
28
reference_url http://secunia.com/advisories/27102
reference_id
reference_type
scores
url http://secunia.com/advisories/27102
29
reference_url http://secunia.com/advisories/27110
reference_id
reference_type
scores
url http://secunia.com/advisories/27110
30
reference_url http://secunia.com/advisories/27545
reference_id
reference_type
scores
url http://secunia.com/advisories/27545
31
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
32
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
33
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
34
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
35
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
36
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34420
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34420
37
reference_url https://issues.rpath.com/browse/RPL-1394
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1394
38
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
39
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779
40
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
41
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
42
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
43
reference_url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
44
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
45
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:122
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:122
46
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:123
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:123
47
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:124
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:124
48
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
49
reference_url http://www.novell.com/linux/security/advisories/2007_13_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_13_sr.html
50
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
51
reference_url http://www.php.net/releases/5_2_3.php
reference_id
reference_type
scores
url http://www.php.net/releases/5_2_3.php
52
reference_url http://www.redhat.com/support/errata/RHSA-2007-0890.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0890.html
53
reference_url http://www.redhat.com/support/errata/RHSA-2007-0891.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0891.html
54
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
55
reference_url http://www.securityfocus.com/bid/24089
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24089
56
reference_url http://www.securitytracker.com/id?1018187
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018187
57
reference_url http://www.trustix.org/errata/2007/0019/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0019/
58
reference_url http://www.trustix.org/errata/2007/0023/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0023/
59
reference_url http://www.ubuntu.com/usn/usn-473-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-473-1
60
reference_url http://www.vupen.com/english/advisories/2007/1904
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1904
61
reference_url http://www.vupen.com/english/advisories/2007/1905
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1905
62
reference_url http://www.vupen.com/english/advisories/2007/2016
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2016
63
reference_url http://www.vupen.com/english/advisories/2007/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2336
64
reference_url http://www.vupen.com/english/advisories/2007/3386
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3386
65
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=242033
reference_id 242033
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=242033
66
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584
reference_id 425584
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584
67
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
68
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2756
reference_id CVE-2007-2756
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-2756
71
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
72
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
73
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
74
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
75
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
76
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
77
reference_url https://usn.ubuntu.com/473-1/
reference_id USN-473-1
reference_type
scores
url https://usn.ubuntu.com/473-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4ehv-84qa-fubx
5
vulnerability VCID-4eyx-7fmr-r7dm
6
vulnerability VCID-6xda-97rd-9bam
7
vulnerability VCID-6ysv-9bmx-w7df
8
vulnerability VCID-75xx-y3xu-cqe2
9
vulnerability VCID-7rvx-8x2z-7kdm
10
vulnerability VCID-9wvm-w1qk-xycw
11
vulnerability VCID-9zks-j1fv-ukew
12
vulnerability VCID-b878-mmfs-e3g1
13
vulnerability VCID-cr4d-8dhn-gkgq
14
vulnerability VCID-fcm8-f9e6-83b4
15
vulnerability VCID-fwyg-v128-k7c9
16
vulnerability VCID-g1b8-dkd3-j3a2
17
vulnerability VCID-g3zj-r8ag-a7ej
18
vulnerability VCID-habv-tr8c-rucd
19
vulnerability VCID-hwys-fv79-b7d8
20
vulnerability VCID-j52b-eq6b-dqae
21
vulnerability VCID-jhzv-9ey6-gkdz
22
vulnerability VCID-jun7-q9ts-ebfe
23
vulnerability VCID-k6qv-tnq5-ybd7
24
vulnerability VCID-ku2g-q6cg-ayhc
25
vulnerability VCID-m3ve-pf4u-9qhh
26
vulnerability VCID-pnee-e13t-57a2
27
vulnerability VCID-qqe4-4aja-j7dz
28
vulnerability VCID-r7yv-ryzk-z3e8
29
vulnerability VCID-s33d-rhg8-wqej
30
vulnerability VCID-s83u-wk4f-wkfd
31
vulnerability VCID-sszm-mvm2-m7ee
32
vulnerability VCID-tfaf-hb2s-fyb9
33
vulnerability VCID-vya2-pzx7-m7c1
34
vulnerability VCID-x14b-aaj3-nyed
35
vulnerability VCID-x635-b1cj-m7d7
36
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1
aliases CVE-2007-2756
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tttf-2akk-57ez
42
url VCID-vqee-h72u-hbar
vulnerability_id VCID-vqee-h72u-hbar
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
reference_id
reference_type
scores
url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
1
reference_url http://bugs.libgd.org/?do=details&task_id=87
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=87
2
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
5
reference_url http://osvdb.org/37741
reference_id
reference_type
scores
url http://osvdb.org/37741
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3476.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3476.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3476
reference_id
reference_type
scores
0
value 0.05321
scoring_system epss
scoring_elements 0.90001
published_at 2026-04-01T12:55:00Z
1
value 0.05321
scoring_system epss
scoring_elements 0.90003
published_at 2026-04-02T12:55:00Z
2
value 0.05321
scoring_system epss
scoring_elements 0.90015
published_at 2026-04-04T12:55:00Z
3
value 0.05321
scoring_system epss
scoring_elements 0.90021
published_at 2026-04-07T12:55:00Z
4
value 0.06471
scoring_system epss
scoring_elements 0.91081
published_at 2026-04-13T12:55:00Z
5
value 0.06471
scoring_system epss
scoring_elements 0.91105
published_at 2026-04-18T12:55:00Z
6
value 0.06471
scoring_system epss
scoring_elements 0.91065
published_at 2026-04-08T12:55:00Z
7
value 0.06471
scoring_system epss
scoring_elements 0.91071
published_at 2026-04-09T12:55:00Z
8
value 0.06471
scoring_system epss
scoring_elements 0.9108
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3476
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476
10
reference_url http://secunia.com/advisories/25860
reference_id
reference_type
scores
url http://secunia.com/advisories/25860
11
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
12
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
13
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
14
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
15
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
16
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
17
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
18
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
19
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
20
reference_url http://secunia.com/advisories/31168
reference_id
reference_type
scores
url http://secunia.com/advisories/31168
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
23
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
24
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
25
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
26
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348
27
reference_url http://www.debian.org/security/2008/dsa-1613
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1613
28
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
29
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
30
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
31
reference_url http://www.novell.com/linux/security/advisories/2007_15_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_15_sr.html
32
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
34
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
35
reference_url http://www.securityfocus.com/bid/24651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24651
36
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
37
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277201
reference_id 277201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277201
39
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
reference_id 601525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3476
reference_id CVE-2007-3476
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3476
42
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
43
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
44
reference_url https://usn.ubuntu.com/854-1/
reference_id USN-854-1
reference_type
scores
url https://usn.ubuntu.com/854-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4ehv-84qa-fubx
5
vulnerability VCID-4eyx-7fmr-r7dm
6
vulnerability VCID-6xda-97rd-9bam
7
vulnerability VCID-6ysv-9bmx-w7df
8
vulnerability VCID-75xx-y3xu-cqe2
9
vulnerability VCID-7rvx-8x2z-7kdm
10
vulnerability VCID-9wvm-w1qk-xycw
11
vulnerability VCID-9zks-j1fv-ukew
12
vulnerability VCID-b878-mmfs-e3g1
13
vulnerability VCID-cr4d-8dhn-gkgq
14
vulnerability VCID-fcm8-f9e6-83b4
15
vulnerability VCID-fwyg-v128-k7c9
16
vulnerability VCID-g1b8-dkd3-j3a2
17
vulnerability VCID-g3zj-r8ag-a7ej
18
vulnerability VCID-habv-tr8c-rucd
19
vulnerability VCID-hwys-fv79-b7d8
20
vulnerability VCID-j52b-eq6b-dqae
21
vulnerability VCID-jhzv-9ey6-gkdz
22
vulnerability VCID-jun7-q9ts-ebfe
23
vulnerability VCID-k6qv-tnq5-ybd7
24
vulnerability VCID-ku2g-q6cg-ayhc
25
vulnerability VCID-m3ve-pf4u-9qhh
26
vulnerability VCID-pnee-e13t-57a2
27
vulnerability VCID-qqe4-4aja-j7dz
28
vulnerability VCID-r7yv-ryzk-z3e8
29
vulnerability VCID-s33d-rhg8-wqej
30
vulnerability VCID-s83u-wk4f-wkfd
31
vulnerability VCID-sszm-mvm2-m7ee
32
vulnerability VCID-tfaf-hb2s-fyb9
33
vulnerability VCID-vya2-pzx7-m7c1
34
vulnerability VCID-x14b-aaj3-nyed
35
vulnerability VCID-x635-b1cj-m7d7
36
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1
aliases CVE-2007-3476
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqee-h72u-hbar
43
url VCID-vya2-pzx7-m7c1
vulnerability_id VCID-vya2-pzx7-m7c1
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8670.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8670
reference_id
reference_type
scores
0
value 0.01659
scoring_system epss
scoring_elements 0.8199
published_at 2026-04-01T12:55:00Z
1
value 0.01659
scoring_system epss
scoring_elements 0.82091
published_at 2026-04-18T12:55:00Z
2
value 0.01659
scoring_system epss
scoring_elements 0.82064
published_at 2026-04-12T12:55:00Z
3
value 0.01659
scoring_system epss
scoring_elements 0.82056
published_at 2026-04-13T12:55:00Z
4
value 0.01659
scoring_system epss
scoring_elements 0.82002
published_at 2026-04-02T12:55:00Z
5
value 0.01659
scoring_system epss
scoring_elements 0.82024
published_at 2026-04-04T12:55:00Z
6
value 0.01659
scoring_system epss
scoring_elements 0.8202
published_at 2026-04-07T12:55:00Z
7
value 0.01659
scoring_system epss
scoring_elements 0.82047
published_at 2026-04-08T12:55:00Z
8
value 0.01659
scoring_system epss
scoring_elements 0.82054
published_at 2026-04-09T12:55:00Z
9
value 0.01659
scoring_system epss
scoring_elements 0.82074
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8670
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1391068
reference_id 1391068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1391068
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840805
reference_id 840805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840805
8
reference_url https://security.archlinux.org/ASA-201611-19
reference_id ASA-201611-19
reference_type
scores
url https://security.archlinux.org/ASA-201611-19
9
reference_url https://security.archlinux.org/AVG-58
reference_id AVG-58
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-58
10
reference_url https://usn.ubuntu.com/3117-1/
reference_id USN-3117-1
reference_type
scores
url https://usn.ubuntu.com/3117-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-8670
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vya2-pzx7-m7c1
44
url VCID-x14b-aaj3-nyed
vulnerability_id VCID-x14b-aaj3-nyed
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9317.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9317.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9317
reference_id
reference_type
scores
0
value 0.01088
scoring_system epss
scoring_elements 0.77859
published_at 2026-04-01T12:55:00Z
1
value 0.01088
scoring_system epss
scoring_elements 0.77866
published_at 2026-04-02T12:55:00Z
2
value 0.01088
scoring_system epss
scoring_elements 0.77894
published_at 2026-04-04T12:55:00Z
3
value 0.01088
scoring_system epss
scoring_elements 0.77876
published_at 2026-04-07T12:55:00Z
4
value 0.01088
scoring_system epss
scoring_elements 0.77904
published_at 2026-04-08T12:55:00Z
5
value 0.01088
scoring_system epss
scoring_elements 0.77908
published_at 2026-04-09T12:55:00Z
6
value 0.01088
scoring_system epss
scoring_elements 0.77935
published_at 2026-04-11T12:55:00Z
7
value 0.01088
scoring_system epss
scoring_elements 0.77919
published_at 2026-04-13T12:55:00Z
8
value 0.01088
scoring_system epss
scoring_elements 0.77957
published_at 2026-04-16T12:55:00Z
9
value 0.01088
scoring_system epss
scoring_elements 0.77955
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9317
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1417987
reference_id 1417987
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1417987
10
reference_url https://usn.ubuntu.com/3213-1/
reference_id USN-3213-1
reference_type
scores
url https://usn.ubuntu.com/3213-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
purl pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4eyx-7fmr-r7dm
5
vulnerability VCID-6xda-97rd-9bam
6
vulnerability VCID-6ysv-9bmx-w7df
7
vulnerability VCID-75xx-y3xu-cqe2
8
vulnerability VCID-7rvx-8x2z-7kdm
9
vulnerability VCID-9zks-j1fv-ukew
10
vulnerability VCID-b878-mmfs-e3g1
11
vulnerability VCID-cr4d-8dhn-gkgq
12
vulnerability VCID-fcm8-f9e6-83b4
13
vulnerability VCID-fwyg-v128-k7c9
14
vulnerability VCID-g1b8-dkd3-j3a2
15
vulnerability VCID-g3zj-r8ag-a7ej
16
vulnerability VCID-habv-tr8c-rucd
17
vulnerability VCID-hwys-fv79-b7d8
18
vulnerability VCID-jhzv-9ey6-gkdz
19
vulnerability VCID-jun7-q9ts-ebfe
20
vulnerability VCID-k6qv-tnq5-ybd7
21
vulnerability VCID-ku2g-q6cg-ayhc
22
vulnerability VCID-m3ve-pf4u-9qhh
23
vulnerability VCID-pnee-e13t-57a2
24
vulnerability VCID-qqe4-4aja-j7dz
25
vulnerability VCID-r7yv-ryzk-z3e8
26
vulnerability VCID-s33d-rhg8-wqej
27
vulnerability VCID-s83u-wk4f-wkfd
28
vulnerability VCID-sszm-mvm2-m7ee
29
vulnerability VCID-tfaf-hb2s-fyb9
30
vulnerability VCID-vya2-pzx7-m7c1
31
vulnerability VCID-x14b-aaj3-nyed
32
vulnerability VCID-x635-b1cj-m7d7
33
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11
1
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
aliases CVE-2016-9317
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x14b-aaj3-nyed
45
url VCID-x635-b1cj-m7d7
vulnerability_id VCID-x635-b1cj-m7d7
summary
Multiple vulnerabilities have been found in GD, the worst of which
    could result in the remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6978.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6978.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6978
reference_id
reference_type
scores
0
value 0.02564
scoring_system epss
scoring_elements 0.8545
published_at 2026-04-01T12:55:00Z
1
value 0.02564
scoring_system epss
scoring_elements 0.8555
published_at 2026-04-18T12:55:00Z
2
value 0.02564
scoring_system epss
scoring_elements 0.85526
published_at 2026-04-11T12:55:00Z
3
value 0.02564
scoring_system epss
scoring_elements 0.85525
published_at 2026-04-12T12:55:00Z
4
value 0.02564
scoring_system epss
scoring_elements 0.85521
published_at 2026-04-13T12:55:00Z
5
value 0.02564
scoring_system epss
scoring_elements 0.85545
published_at 2026-04-16T12:55:00Z
6
value 0.02564
scoring_system epss
scoring_elements 0.85463
published_at 2026-04-02T12:55:00Z
7
value 0.02564
scoring_system epss
scoring_elements 0.8548
published_at 2026-04-04T12:55:00Z
8
value 0.02564
scoring_system epss
scoring_elements 0.85483
published_at 2026-04-07T12:55:00Z
9
value 0.02564
scoring_system epss
scoring_elements 0.85503
published_at 2026-04-08T12:55:00Z
10
value 0.02564
scoring_system epss
scoring_elements 0.85512
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6978
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/libgd/libgd/commit/553702980ae89c83f2d6e254d62cf82e204956d0
reference_id
reference_type
scores
url https://github.com/libgd/libgd/commit/553702980ae89c83f2d6e254d62cf82e204956d0
8
reference_url https://github.com/libgd/libgd/issues/492
reference_id
reference_type
scores
url https://github.com/libgd/libgd/issues/492
9
reference_url https://github.com/php/php-src/commit/089f7c0bc28d399b0420aa6ef058e4c1c120b2ae
reference_id
reference_type
scores
url https://github.com/php/php-src/commit/089f7c0bc28d399b0420aa6ef058e4c1c120b2ae
10
reference_url https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/
15
reference_url https://www.debian.org/security/2019/dsa-4384
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4384
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1671390
reference_id 1671390
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1671390
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920728
reference_id 920728
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920728
18
reference_url https://security.archlinux.org/AVG-865
reference_id AVG-865
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-865
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6978
reference_id CVE-2019-6978
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-6978
27
reference_url https://security.gentoo.org/glsa/201903-18
reference_id GLSA-201903-18
reference_type
scores
url https://security.gentoo.org/glsa/201903-18
28
reference_url https://access.redhat.com/errata/RHSA-2019:2722
reference_id RHSA-2019:2722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2722
29
reference_url https://access.redhat.com/errata/RHSA-2020:3943
reference_id RHSA-2020:3943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3943
30
reference_url https://access.redhat.com/errata/RHSA-2020:4659
reference_id RHSA-2020:4659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4659
31
reference_url https://usn.ubuntu.com/3900-1/
reference_id USN-3900-1
reference_type
scores
url https://usn.ubuntu.com/3900-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
purl pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bce-bp4m-3bcy
1
vulnerability VCID-3v99-kbeq-47d8
2
vulnerability VCID-6xda-97rd-9bam
3
vulnerability VCID-6ysv-9bmx-w7df
4
vulnerability VCID-g3zj-r8ag-a7ej
5
vulnerability VCID-jun7-q9ts-ebfe
6
vulnerability VCID-qqe4-4aja-j7dz
7
vulnerability VCID-r7yv-ryzk-z3e8
8
vulnerability VCID-s83u-wk4f-wkfd
9
vulnerability VCID-sszm-mvm2-m7ee
10
vulnerability VCID-x635-b1cj-m7d7
11
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5
1
url pkg:deb/debian/libgd2@2.2.5-5.2
purl pkg:deb/debian/libgd2@2.2.5-5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g3zj-r8ag-a7ej
1
vulnerability VCID-jun7-q9ts-ebfe
2
vulnerability VCID-qqe4-4aja-j7dz
3
vulnerability VCID-s83u-wk4f-wkfd
4
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2
aliases CVE-2019-6978
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x635-b1cj-m7d7
46
url VCID-yhfa-jcqy-wkdx
vulnerability_id VCID-yhfa-jcqy-wkdx
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
reference_id
reference_type
scores
url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
1
reference_url http://bugs.libgd.org/?do=details&task_id=70
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=70
2
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3475.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3475.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3475
reference_id
reference_type
scores
0
value 0.12094
scoring_system epss
scoring_elements 0.93764
published_at 2026-04-02T12:55:00Z
1
value 0.12094
scoring_system epss
scoring_elements 0.93774
published_at 2026-04-04T12:55:00Z
2
value 0.12094
scoring_system epss
scoring_elements 0.93778
published_at 2026-04-07T12:55:00Z
3
value 0.12094
scoring_system epss
scoring_elements 0.93755
published_at 2026-04-01T12:55:00Z
4
value 0.1443
scoring_system epss
scoring_elements 0.9443
published_at 2026-04-13T12:55:00Z
5
value 0.1443
scoring_system epss
scoring_elements 0.94445
published_at 2026-04-16T12:55:00Z
6
value 0.1443
scoring_system epss
scoring_elements 0.94449
published_at 2026-04-18T12:55:00Z
7
value 0.1443
scoring_system epss
scoring_elements 0.94421
published_at 2026-04-08T12:55:00Z
8
value 0.1443
scoring_system epss
scoring_elements 0.94425
published_at 2026-04-09T12:55:00Z
9
value 0.1443
scoring_system epss
scoring_elements 0.94428
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3475
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475
9
reference_url http://secunia.com/advisories/25860
reference_id
reference_type
scores
url http://secunia.com/advisories/25860
10
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
11
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
12
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
13
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
14
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
15
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
16
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
17
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
18
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
19
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
20
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
21
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
22
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
23
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
24
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9728
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9728
25
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
27
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
28
reference_url http://www.novell.com/linux/security/advisories/2007_15_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_15_sr.html
29
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
31
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
32
reference_url http://www.securityfocus.com/bid/24651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24651
33
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
34
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277181
reference_id 277181
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277181
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3475
reference_id CVE-2007-3475
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3475
38
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
39
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
40
reference_url https://usn.ubuntu.com/854-1/
reference_id USN-854-1
reference_type
scores
url https://usn.ubuntu.com/854-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
purl pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-4ehv-84qa-fubx
5
vulnerability VCID-4eyx-7fmr-r7dm
6
vulnerability VCID-6xda-97rd-9bam
7
vulnerability VCID-6ysv-9bmx-w7df
8
vulnerability VCID-75xx-y3xu-cqe2
9
vulnerability VCID-7rvx-8x2z-7kdm
10
vulnerability VCID-9wvm-w1qk-xycw
11
vulnerability VCID-9zks-j1fv-ukew
12
vulnerability VCID-b878-mmfs-e3g1
13
vulnerability VCID-cr4d-8dhn-gkgq
14
vulnerability VCID-fcm8-f9e6-83b4
15
vulnerability VCID-fwyg-v128-k7c9
16
vulnerability VCID-g1b8-dkd3-j3a2
17
vulnerability VCID-g3zj-r8ag-a7ej
18
vulnerability VCID-habv-tr8c-rucd
19
vulnerability VCID-hwys-fv79-b7d8
20
vulnerability VCID-j52b-eq6b-dqae
21
vulnerability VCID-jhzv-9ey6-gkdz
22
vulnerability VCID-jun7-q9ts-ebfe
23
vulnerability VCID-k6qv-tnq5-ybd7
24
vulnerability VCID-ku2g-q6cg-ayhc
25
vulnerability VCID-m3ve-pf4u-9qhh
26
vulnerability VCID-pnee-e13t-57a2
27
vulnerability VCID-qqe4-4aja-j7dz
28
vulnerability VCID-r7yv-ryzk-z3e8
29
vulnerability VCID-s33d-rhg8-wqej
30
vulnerability VCID-s83u-wk4f-wkfd
31
vulnerability VCID-sszm-mvm2-m7ee
32
vulnerability VCID-tfaf-hb2s-fyb9
33
vulnerability VCID-vya2-pzx7-m7c1
34
vulnerability VCID-x14b-aaj3-nyed
35
vulnerability VCID-x635-b1cj-m7d7
36
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1
aliases CVE-2007-3475
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yhfa-jcqy-wkdx
47
url VCID-zp5r-wjhe-u7b3
vulnerability_id VCID-zp5r-wjhe-u7b3
summary gd: NULL pointer dereference in gdImageClone
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14553.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14553
reference_id
reference_type
scores
0
value 0.00979
scoring_system epss
scoring_elements 0.76696
published_at 2026-04-01T12:55:00Z
1
value 0.00979
scoring_system epss
scoring_elements 0.767
published_at 2026-04-02T12:55:00Z
2
value 0.00979
scoring_system epss
scoring_elements 0.76729
published_at 2026-04-04T12:55:00Z
3
value 0.00979
scoring_system epss
scoring_elements 0.76711
published_at 2026-04-07T12:55:00Z
4
value 0.00979
scoring_system epss
scoring_elements 0.76743
published_at 2026-04-08T12:55:00Z
5
value 0.00979
scoring_system epss
scoring_elements 0.76754
published_at 2026-04-13T12:55:00Z
6
value 0.00979
scoring_system epss
scoring_elements 0.76782
published_at 2026-04-11T12:55:00Z
7
value 0.00979
scoring_system epss
scoring_elements 0.76762
published_at 2026-04-12T12:55:00Z
8
value 0.00979
scoring_system epss
scoring_elements 0.76795
published_at 2026-04-16T12:55:00Z
9
value 0.00979
scoring_system epss
scoring_elements 0.768
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14553
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1600727
reference_id 1600727
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1600727
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951287
reference_id 951287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951287
6
reference_url https://access.redhat.com/errata/RHSA-2020:4659
reference_id RHSA-2020:4659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4659
7
reference_url https://usn.ubuntu.com/4316-1/
reference_id USN-4316-1
reference_type
scores
url https://usn.ubuntu.com/4316-1/
8
reference_url https://usn.ubuntu.com/4316-2/
reference_id USN-4316-2
reference_type
scores
url https://usn.ubuntu.com/4316-2/
fixed_packages
0
url pkg:deb/debian/libgd2@2.3.0-2
purl pkg:deb/debian/libgd2@2.3.0-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g3zj-r8ag-a7ej
1
vulnerability VCID-qqe4-4aja-j7dz
2
vulnerability VCID-s83u-wk4f-wkfd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2
aliases CVE-2018-14553
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zp5r-wjhe-u7b3
Fixing_vulnerabilities
0
url VCID-2bcm-xg5v-kyaw
vulnerability_id VCID-2bcm-xg5v-kyaw
summary gd: GIF handling buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4484.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4484.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4484
reference_id
reference_type
scores
0
value 0.06436
scoring_system epss
scoring_elements 0.91011
published_at 2026-04-01T12:55:00Z
1
value 0.06436
scoring_system epss
scoring_elements 0.91015
published_at 2026-04-02T12:55:00Z
2
value 0.06436
scoring_system epss
scoring_elements 0.91025
published_at 2026-04-04T12:55:00Z
3
value 0.06436
scoring_system epss
scoring_elements 0.91034
published_at 2026-04-07T12:55:00Z
4
value 0.06436
scoring_system epss
scoring_elements 0.91046
published_at 2026-04-08T12:55:00Z
5
value 0.06436
scoring_system epss
scoring_elements 0.91053
published_at 2026-04-09T12:55:00Z
6
value 0.06436
scoring_system epss
scoring_elements 0.91061
published_at 2026-04-13T12:55:00Z
7
value 0.06436
scoring_system epss
scoring_elements 0.91085
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4484
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384838
reference_id 384838
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384838
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384841
reference_id 384841
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384841
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431568
reference_id 431568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431568
6
reference_url https://access.redhat.com/errata/RHSA-2006:0669
reference_id RHSA-2006:0669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0669
7
reference_url https://access.redhat.com/errata/RHSA-2006:0688
reference_id RHSA-2006:0688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0688
8
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
9
reference_url https://usn.ubuntu.com/342-1/
reference_id USN-342-1
reference_type
scores
url https://usn.ubuntu.com/342-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.33-5.2
purl pkg:deb/debian/libgd2@2.0.33-5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-45dp-3xz9-qyd3
5
vulnerability VCID-4ehv-84qa-fubx
6
vulnerability VCID-4eyx-7fmr-r7dm
7
vulnerability VCID-6xda-97rd-9bam
8
vulnerability VCID-6ysv-9bmx-w7df
9
vulnerability VCID-75xx-y3xu-cqe2
10
vulnerability VCID-7d1e-wnq6-4qfr
11
vulnerability VCID-7rvx-8x2z-7kdm
12
vulnerability VCID-9wvm-w1qk-xycw
13
vulnerability VCID-9zks-j1fv-ukew
14
vulnerability VCID-b878-mmfs-e3g1
15
vulnerability VCID-busj-qfth-v7e3
16
vulnerability VCID-cr4d-8dhn-gkgq
17
vulnerability VCID-ek5b-jujn-bqet
18
vulnerability VCID-fcm8-f9e6-83b4
19
vulnerability VCID-fwyg-v128-k7c9
20
vulnerability VCID-g1b8-dkd3-j3a2
21
vulnerability VCID-g3zj-r8ag-a7ej
22
vulnerability VCID-habv-tr8c-rucd
23
vulnerability VCID-hwys-fv79-b7d8
24
vulnerability VCID-j15c-u5ty-jug1
25
vulnerability VCID-j52b-eq6b-dqae
26
vulnerability VCID-jhzv-9ey6-gkdz
27
vulnerability VCID-jun7-q9ts-ebfe
28
vulnerability VCID-k6qv-tnq5-ybd7
29
vulnerability VCID-ku2g-q6cg-ayhc
30
vulnerability VCID-m3ve-pf4u-9qhh
31
vulnerability VCID-n7w7-16vs-z3gg
32
vulnerability VCID-pnee-e13t-57a2
33
vulnerability VCID-qqe4-4aja-j7dz
34
vulnerability VCID-r7yv-ryzk-z3e8
35
vulnerability VCID-s33d-rhg8-wqej
36
vulnerability VCID-s83u-wk4f-wkfd
37
vulnerability VCID-sszm-mvm2-m7ee
38
vulnerability VCID-svg5-jd8s-mbb5
39
vulnerability VCID-szfb-zfrk-4qha
40
vulnerability VCID-tfaf-hb2s-fyb9
41
vulnerability VCID-tttf-2akk-57ez
42
vulnerability VCID-vqee-h72u-hbar
43
vulnerability VCID-vya2-pzx7-m7c1
44
vulnerability VCID-x14b-aaj3-nyed
45
vulnerability VCID-x635-b1cj-m7d7
46
vulnerability VCID-yhfa-jcqy-wkdx
47
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.33-5.2
aliases CVE-2006-4484
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2bcm-xg5v-kyaw
1
url VCID-he5a-srth-rydf
vulnerability_id VCID-he5a-srth-rydf
summary The LZW decoding in the gdImageCreateFromGifPtr function in the Thomas Boutell graphics draw (GD) library (aka libgd) 2.0.33 allows remote attackers to cause a denial of service (CPU consumption) via malformed GIF data that causes an infinite loop.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2906.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2906.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2906
reference_id
reference_type
scores
0
value 0.15275
scoring_system epss
scoring_elements 0.94581
published_at 2026-04-01T12:55:00Z
1
value 0.15275
scoring_system epss
scoring_elements 0.94588
published_at 2026-04-02T12:55:00Z
2
value 0.15275
scoring_system epss
scoring_elements 0.94595
published_at 2026-04-04T12:55:00Z
3
value 0.15275
scoring_system epss
scoring_elements 0.94598
published_at 2026-04-07T12:55:00Z
4
value 0.15275
scoring_system epss
scoring_elements 0.94608
published_at 2026-04-08T12:55:00Z
5
value 0.15275
scoring_system epss
scoring_elements 0.94612
published_at 2026-04-09T12:55:00Z
6
value 0.15275
scoring_system epss
scoring_elements 0.94616
published_at 2026-04-11T12:55:00Z
7
value 0.15275
scoring_system epss
scoring_elements 0.94619
published_at 2026-04-13T12:55:00Z
8
value 0.15275
scoring_system epss
scoring_elements 0.94632
published_at 2026-04-16T12:55:00Z
9
value 0.15275
scoring_system epss
scoring_elements 0.94635
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2906
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2906
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=372912
reference_id 372912
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=372912
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/27981.c
reference_id CVE-2006-2906;OSVDB-26260
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/27981.c
5
reference_url https://www.securityfocus.com/bid/18294/info
reference_id CVE-2006-2906;OSVDB-26260
reference_type exploit
scores
url https://www.securityfocus.com/bid/18294/info
6
reference_url https://usn.ubuntu.com/298-1/
reference_id USN-298-1
reference_type
scores
url https://usn.ubuntu.com/298-1/
fixed_packages
0
url pkg:deb/debian/libgd2@2.0.33-5.2
purl pkg:deb/debian/libgd2@2.0.33-5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1pj7-5gy9-97f7
1
vulnerability VCID-34yj-pb2j-5faa
2
vulnerability VCID-3bce-bp4m-3bcy
3
vulnerability VCID-3v99-kbeq-47d8
4
vulnerability VCID-45dp-3xz9-qyd3
5
vulnerability VCID-4ehv-84qa-fubx
6
vulnerability VCID-4eyx-7fmr-r7dm
7
vulnerability VCID-6xda-97rd-9bam
8
vulnerability VCID-6ysv-9bmx-w7df
9
vulnerability VCID-75xx-y3xu-cqe2
10
vulnerability VCID-7d1e-wnq6-4qfr
11
vulnerability VCID-7rvx-8x2z-7kdm
12
vulnerability VCID-9wvm-w1qk-xycw
13
vulnerability VCID-9zks-j1fv-ukew
14
vulnerability VCID-b878-mmfs-e3g1
15
vulnerability VCID-busj-qfth-v7e3
16
vulnerability VCID-cr4d-8dhn-gkgq
17
vulnerability VCID-ek5b-jujn-bqet
18
vulnerability VCID-fcm8-f9e6-83b4
19
vulnerability VCID-fwyg-v128-k7c9
20
vulnerability VCID-g1b8-dkd3-j3a2
21
vulnerability VCID-g3zj-r8ag-a7ej
22
vulnerability VCID-habv-tr8c-rucd
23
vulnerability VCID-hwys-fv79-b7d8
24
vulnerability VCID-j15c-u5ty-jug1
25
vulnerability VCID-j52b-eq6b-dqae
26
vulnerability VCID-jhzv-9ey6-gkdz
27
vulnerability VCID-jun7-q9ts-ebfe
28
vulnerability VCID-k6qv-tnq5-ybd7
29
vulnerability VCID-ku2g-q6cg-ayhc
30
vulnerability VCID-m3ve-pf4u-9qhh
31
vulnerability VCID-n7w7-16vs-z3gg
32
vulnerability VCID-pnee-e13t-57a2
33
vulnerability VCID-qqe4-4aja-j7dz
34
vulnerability VCID-r7yv-ryzk-z3e8
35
vulnerability VCID-s33d-rhg8-wqej
36
vulnerability VCID-s83u-wk4f-wkfd
37
vulnerability VCID-sszm-mvm2-m7ee
38
vulnerability VCID-svg5-jd8s-mbb5
39
vulnerability VCID-szfb-zfrk-4qha
40
vulnerability VCID-tfaf-hb2s-fyb9
41
vulnerability VCID-tttf-2akk-57ez
42
vulnerability VCID-vqee-h72u-hbar
43
vulnerability VCID-vya2-pzx7-m7c1
44
vulnerability VCID-x14b-aaj3-nyed
45
vulnerability VCID-x635-b1cj-m7d7
46
vulnerability VCID-yhfa-jcqy-wkdx
47
vulnerability VCID-zp5r-wjhe-u7b3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.33-5.2
aliases CVE-2006-2906
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-he5a-srth-rydf
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.33-5.2