Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1035354?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1035354?format=api", "purl": "pkg:deb/debian/libgd2@2.0.33-5.2etch2", "type": "deb", "namespace": "debian", "name": "libgd2", "version": "2.0.33-5.2etch2", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.3.3-9", "latest_non_vulnerable_version": "2.3.3-9", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81340?format=api", "vulnerability_id": "VCID-1pj7-5gy9-97f7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10167.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10167.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10167", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76636", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76639", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76668", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76649", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76681", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76692", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.7672", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.767", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76734", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418984", "reference_id": "1418984", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418984" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3221", "reference_id": "RHSA-2017:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1296", "reference_id": "RHSA-2018:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1296" }, { "reference_url": "https://usn.ubuntu.com/3213-1/", "reference_id": "USN-3213-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3213-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-10167" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1pj7-5gy9-97f7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81583?format=api", "vulnerability_id": "VCID-34yj-pb2j-5faa", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5116.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5116.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85064", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.84967", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.84981", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.84998", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85002", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85025", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85032", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85048", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85046", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85043", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340856", "reference_id": "1340856", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340856" }, { "reference_url": "https://usn.ubuntu.com/3030-1/", "reference_id": "USN-3030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3030-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-5116" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-34yj-pb2j-5faa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72442?format=api", "vulnerability_id": "VCID-3bce-bp4m-3bcy", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6362.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6362.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6362", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61463", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.80262", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.80277", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.80204", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.80212", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.80232", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.8022", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.80248", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.80259", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/libgd/libgd/issues/381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/issues/381" }, { "reference_url": "https://github.com/libgd/libgd/releases/tag/gd-2.2.5", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/releases/tag/gd-2.2.5" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2BLXX7KNRE7ZVQAKGTHHWS33CUCXVUP/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2BLXX7KNRE7ZVQAKGTHHWS33CUCXVUP/" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3961" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489842", "reference_id": "1489842", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489842" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:libgd:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6362", "reference_id": "CVE-2017-6362", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6362" }, { "reference_url": "https://usn.ubuntu.com/3410-1/", "reference_id": "USN-3410-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3410-1/" }, { "reference_url": "https://usn.ubuntu.com/3410-2/", "reference_id": "USN-3410-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3410-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049591?format=api", "purl": "pkg:deb/debian/libgd2@2.2.5-5.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2" } ], "aliases": [ "CVE-2017-6362" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3bce-bp4m-3bcy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61526?format=api", "vulnerability_id": "VCID-3v99-kbeq-47d8", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n could result in the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5711.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5711.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5711", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91953", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.92008", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91993", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.9199", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91961", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91969", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91988", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91991", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91994", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535246", "reference_id": "1535246", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535246" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887485", "reference_id": "887485", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887485" }, { "reference_url": "https://security.archlinux.org/AVG-865", "reference_id": "AVG-865", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-865" }, { "reference_url": "https://security.gentoo.org/glsa/201903-18", "reference_id": "GLSA-201903-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1296", "reference_id": "RHSA-2018:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2519", "reference_id": "RHSA-2019:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2519" }, { "reference_url": "https://usn.ubuntu.com/3755-1/", "reference_id": "USN-3755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3755-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049591?format=api", "purl": "pkg:deb/debian/libgd2@2.2.5-5.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2" } ], "aliases": [ "CVE-2018-5711" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3v99-kbeq-47d8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46241?format=api", "vulnerability_id": "VCID-45dp-3xz9-qyd3", "summary": "A vulnerability in libpng may allow a remote attacker to crash applications\n that handle untrusted images.", "references": [ { "reference_url": "http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html" }, { "reference_url": "http://docs.info.apple.com/article.html?artnum=307562", "reference_id": "", "reference_type": "", "scores": [], "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "reference_url": "http://irrlicht.sourceforge.net/changes.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://irrlicht.sourceforge.net/changes.txt" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "reference_url": "http://openpkg.com/go/OpenPKG-SA-2007.013", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openpkg.com/go/OpenPKG-SA-2007.013" }, { "reference_url": "http://osvdb.org/36196", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/36196" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2445.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2445.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2445", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.38264", "scoring_system": "epss", "scoring_elements": "0.97236", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.38264", "scoring_system": "epss", "scoring_elements": "0.972", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.38264", "scoring_system": "epss", "scoring_elements": "0.97206", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.38264", "scoring_system": "epss", "scoring_elements": "0.97212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.38264", "scoring_system": "epss", "scoring_elements": "0.97213", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.38264", "scoring_system": "epss", "scoring_elements": "0.97222", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.38264", "scoring_system": "epss", "scoring_elements": "0.97223", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.38264", "scoring_system": "epss", "scoring_elements": "0.97227", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.38264", "scoring_system": "epss", "scoring_elements": "0.97228", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2445" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445" }, { "reference_url": "http://secunia.com/advisories/25268", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25268" }, { "reference_url": "http://secunia.com/advisories/25273", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25273" }, { "reference_url": "http://secunia.com/advisories/25292", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25292" }, { "reference_url": "http://secunia.com/advisories/25329", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25329" }, { "reference_url": "http://secunia.com/advisories/25353", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25353" }, { "reference_url": "http://secunia.com/advisories/25461", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25461" }, { "reference_url": "http://secunia.com/advisories/25554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25554" }, { "reference_url": "http://secunia.com/advisories/25571", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25571" }, { "reference_url": "http://secunia.com/advisories/25742", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25742" }, { "reference_url": "http://secunia.com/advisories/25787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25787" }, { "reference_url": "http://secunia.com/advisories/25867", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25867" }, { "reference_url": "http://secunia.com/advisories/27056", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/27056" }, { "reference_url": "http://secunia.com/advisories/29420", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/29420" }, { "reference_url": "http://secunia.com/advisories/30161", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30161" }, { "reference_url": "http://secunia.com/advisories/31168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31168" }, { "reference_url": "http://secunia.com/advisories/34388", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34388" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34340" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1381" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=508653&group_id=5624", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=508653&group_id=5624" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=508656&group_id=5624", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=508656&group_id=5624" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm" }, { "reference_url": "http://www.coresecurity.com/?action=item&id=2148", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.coresecurity.com/?action=item&id=2148" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1613", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1613" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1750", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1750" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml" }, { "reference_url": "http://www.kb.cert.org/vuls/id/684664", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/684664" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:116", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:116" }, { "reference_url": "http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_13_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_13_sr.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0356.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0356.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/468910/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/468910/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/489135/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/489135/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/24000", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/24000" }, { "reference_url": "http://www.securityfocus.com/bid/24023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/24023" }, { "reference_url": "http://www.securitytracker.com/id?1018078", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1018078" }, { "reference_url": "http://www.trustix.org/errata/2007/0019/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2007/0019/" }, { "reference_url": "http://www.ubuntu.com/usn/usn-472-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-472-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/1838", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/1838" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2385" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/0924/references", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=239425", "reference_id": "239425", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239425" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2445", "reference_id": "CVE-2007-2445", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2445" }, { "reference_url": "https://security.gentoo.org/glsa/200705-24", "reference_id": "GLSA-200705-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200705-24" }, { "reference_url": "https://security.gentoo.org/glsa/201412-11", "reference_id": "GLSA-201412-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0356", "reference_id": "RHSA-2007:0356", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0356" }, { "reference_url": "https://usn.ubuntu.com/472-1/", "reference_id": "USN-472-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/472-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035355?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4ehv-84qa-fubx" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1" } ], "aliases": [ "CVE-2007-2445" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45dp-3xz9-qyd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41480?format=api", "vulnerability_id": "VCID-4ehv-84qa-fubx", "summary": "The GD library is prone to a buffer overflow vulnerability.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3546", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04125", "scoring_system": "epss", "scoring_elements": "0.8858", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04125", "scoring_system": "epss", "scoring_elements": "0.88608", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04125", "scoring_system": "epss", "scoring_elements": "0.88627", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04125", "scoring_system": "epss", "scoring_elements": "0.88631", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04125", "scoring_system": "epss", "scoring_elements": "0.88643", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04125", "scoring_system": "epss", "scoring_elements": "0.88589", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04125", "scoring_system": "epss", "scoring_elements": "0.88606", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04663", "scoring_system": "epss", "scoring_elements": "0.89322", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04663", "scoring_system": "epss", "scoring_elements": "0.89319", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04663", "scoring_system": "epss", "scoring_elements": "0.89332", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=529213", "reference_id": "529213", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529213" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534", "reference_id": "552534", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525", "reference_id": "601525", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525" }, { "reference_url": "https://security.archlinux.org/ASA-201701-1", "reference_id": "ASA-201701-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-1" }, { "reference_url": "https://security.archlinux.org/AVG-16", "reference_id": "AVG-16", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-16" }, { "reference_url": "https://security.gentoo.org/glsa/201001-03", "reference_id": "GLSA-201001-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201001-03" }, { "reference_url": "https://security.gentoo.org/glsa/201006-16", "reference_id": "GLSA-201006-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201006-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0003", "reference_id": "RHSA-2010:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0040", "reference_id": "RHSA-2010:0040", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0040" }, { "reference_url": "https://usn.ubuntu.com/854-1/", "reference_id": "USN-854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/854-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035356?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-5" } ], "aliases": [ "CVE-2009-3546" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ehv-84qa-fubx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81336?format=api", "vulnerability_id": "VCID-4eyx-7fmr-r7dm", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6906.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6906.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6906", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63448", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63508", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63535", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63551", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63568", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63584", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63571", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1435313", "reference_id": "1435313", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1435313" }, { "reference_url": "https://usn.ubuntu.com/3213-1/", "reference_id": "USN-3213-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3213-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6906" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4eyx-7fmr-r7dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61527?format=api", "vulnerability_id": "VCID-6xda-97rd-9bam", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n could result in the remote execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html" }, { "reference_url": "http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html" }, { "reference_url": "http://php.net/ChangeLog-5.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://php.net/ChangeLog-5.php" }, { "reference_url": "http://php.net/ChangeLog-7.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://php.net/ChangeLog-7.php" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6977.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6977.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6977", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.99399", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.99408", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.99402", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.99403", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.99404", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.99405", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.994", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6977" }, { "reference_url": "https://bugs.php.net/bug.php?id=77270", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.php.net/bug.php?id=77270" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190315-0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190315-0003/" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4384" }, { "reference_url": "https://www.exploit-db.com/exploits/46677/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/46677/" }, { "reference_url": "http://www.securityfocus.com/bid/106731", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106731" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672207", "reference_id": "1672207", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672207" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920645", "reference_id": "920645", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920645" }, { "reference_url": "https://security.archlinux.org/AVG-865", "reference_id": "AVG-865", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-865" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:storage_automation_store:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:7.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://github.com/cfreal/exploits/blob/1a671d1d8510e93a0b2607261e9b779562585fe2/CVE-2019-6977-imagecolormatch/exploit.php", "reference_id": "CVE-2019-6977", "reference_type": "exploit", "scores": [], "url": "https://github.com/cfreal/exploits/blob/1a671d1d8510e93a0b2607261e9b779562585fe2/CVE-2019-6977-imagecolormatch/exploit.php" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/46677.php", "reference_id": "CVE-2019-6977", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/46677.php" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6977", "reference_id": "CVE-2019-6977", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6977" }, { "reference_url": "https://security.gentoo.org/glsa/201903-18", "reference_id": "GLSA-201903-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2519", "reference_id": "RHSA-2019:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3299", "reference_id": "RHSA-2019:3299", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3299" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4659", "reference_id": "RHSA-2020:4659", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4659" }, { "reference_url": "https://usn.ubuntu.com/3900-1/", "reference_id": "USN-3900-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3900-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049591?format=api", "purl": "pkg:deb/debian/libgd2@2.2.5-5.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2" } ], "aliases": [ "CVE-2019-6977" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xda-97rd-9bam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72904?format=api", "vulnerability_id": "VCID-6ysv-9bmx-w7df", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7890.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7890.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7890", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.96165", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.96183", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.96193", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.96196", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.96201", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.962", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.96173", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.96181", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.28056", "scoring_system": "epss", "scoring_elements": "0.96475", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.28056", "scoring_system": "epss", "scoring_elements": "0.96482", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473822", "reference_id": "1473822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473822" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869263", "reference_id": "869263", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0406", "reference_id": "RHSA-2018:0406", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0406" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1296", "reference_id": "RHSA-2018:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1296" }, { "reference_url": "https://usn.ubuntu.com/3389-1/", "reference_id": "USN-3389-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3389-1/" }, { "reference_url": "https://usn.ubuntu.com/3389-2/", "reference_id": "USN-3389-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3389-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049591?format=api", "purl": "pkg:deb/debian/libgd2@2.2.5-5.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2" } ], "aliases": [ "CVE-2017-7890" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ysv-9bmx-w7df" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82203?format=api", "vulnerability_id": "VCID-75xx-y3xu-cqe2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6911.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6911.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6911", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70523", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70631", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.706", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70587", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70537", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70554", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70532", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70592", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70615", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388787", "reference_id": "1388787", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388787" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840806", "reference_id": "840806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840806" }, { "reference_url": "https://security.archlinux.org/ASA-201611-19", "reference_id": "ASA-201611-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-19" }, { "reference_url": "https://security.archlinux.org/AVG-58", "reference_id": "AVG-58", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-58" }, { "reference_url": "https://usn.ubuntu.com/3117-1/", "reference_id": "USN-3117-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3117-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6911" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75xx-y3xu-cqe2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41563?format=api", "vulnerability_id": "VCID-7d1e-wnq6-4qfr", "summary": "Multiple vulnerabilities have been discovered in GD, allowing for the\n execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz" }, { "reference_url": "http://bugs.libgd.org/?do=details&task_id=74", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.libgd.org/?do=details&task_id=74" }, { "reference_url": "http://bugs.libgd.org/?do=details&task_id=92", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.libgd.org/?do=details&task_id=92" }, { "reference_url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html" }, { "reference_url": "http://osvdb.org/42062", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/42062" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3477.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3477.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3477", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07202", "scoring_system": "epss", "scoring_elements": "0.91621", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07202", "scoring_system": "epss", "scoring_elements": "0.91599", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07202", "scoring_system": "epss", "scoring_elements": "0.91601", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07483", "scoring_system": "epss", "scoring_elements": "0.91766", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07483", "scoring_system": "epss", "scoring_elements": "0.91745", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07483", "scoring_system": "epss", "scoring_elements": "0.91786", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07483", "scoring_system": "epss", "scoring_elements": "0.91789", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07483", "scoring_system": "epss", "scoring_elements": "0.91779", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07483", "scoring_system": "epss", "scoring_elements": "0.91753", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07483", "scoring_system": "epss", "scoring_elements": "0.91759", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3477" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477" }, { "reference_url": "http://secunia.com/advisories/25860", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25860" }, { "reference_url": "http://secunia.com/advisories/26272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26272" }, { "reference_url": "http://secunia.com/advisories/26390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26390" }, { "reference_url": "http://secunia.com/advisories/26415", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26415" }, { "reference_url": "http://secunia.com/advisories/26467", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26467" }, { "reference_url": "http://secunia.com/advisories/26663", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26663" }, { "reference_url": "http://secunia.com/advisories/26766", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26766" }, { "reference_url": "http://secunia.com/advisories/26856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26856" }, { "reference_url": "http://secunia.com/advisories/30168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30168" }, { "reference_url": "http://secunia.com/advisories/31168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31168" }, { "reference_url": "http://secunia.com/advisories/42813", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42813" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200708-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200711-34.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200805-13.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1643", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1643" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1613", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1613" }, { "reference_url": "http://www.libgd.org/ReleaseNote020035", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.libgd.org/ReleaseNote020035" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/24651", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/24651" }, { "reference_url": "http://www.trustix.org/errata/2007/0024/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2007/0024/" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0022" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=277221", "reference_id": "277221", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277221" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525", "reference_id": "601525", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525" }, { "reference_url": "https://security.archlinux.org/ASA-201701-1", "reference_id": "ASA-201701-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-1" }, { "reference_url": "https://security.archlinux.org/AVG-16", "reference_id": "AVG-16", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-16" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3477", "reference_id": "CVE-2007-3477", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3477" }, { "reference_url": "https://security.gentoo.org/glsa/200708-05", "reference_id": "GLSA-200708-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200708-05" }, { "reference_url": "https://usn.ubuntu.com/854-1/", "reference_id": "USN-854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/854-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035355?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4ehv-84qa-fubx" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1" } ], "aliases": [ "CVE-2007-3477" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7d1e-wnq6-4qfr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81585?format=api", "vulnerability_id": "VCID-7rvx-8x2z-7kdm", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6214.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6214.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91672", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.9168", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91686", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91707", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91714", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91717", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91719", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91715", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91736", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356466", "reference_id": "1356466", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356466" }, { "reference_url": "https://usn.ubuntu.com/3060-1/", "reference_id": "USN-3060-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3060-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6214" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7rvx-8x2z-7kdm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47343?format=api", "vulnerability_id": "VCID-9wvm-w1qk-xycw", "summary": "Multiple vulnerabilities have been found in PHP, the worst of which\n could lead to arbitrary code execution, or cause a Denial of Service\n condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9709.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9709.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9709", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94874", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94883", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94886", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94888", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94897", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94901", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94906", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94908", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.9491", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94917", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188639", "reference_id": "1188639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188639" }, { "reference_url": "https://security.gentoo.org/glsa/201606-10", "reference_id": "GLSA-201606-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201606-10" }, { "reference_url": "https://security.gentoo.org/glsa/201607-04", "reference_id": "GLSA-201607-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201607-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1053", "reference_id": "RHSA-2015:1053", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1053" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1066", "reference_id": "RHSA-2015:1066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1135", "reference_id": "RHSA-2015:1135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1218", "reference_id": "RHSA-2015:1218", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1218" }, { "reference_url": "https://usn.ubuntu.com/2987-1/", "reference_id": "USN-2987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2987-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035358?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%2Bdeb7u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%252Bdeb7u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035838?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5" } ], "aliases": [ "CVE-2014-9709" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9wvm-w1qk-xycw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56174?format=api", "vulnerability_id": "VCID-9zks-j1fv-ukew", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183263.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183263.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183724.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183724.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html" }, { "reference_url": "http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3074.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3074.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3074", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98044", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98038", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98019", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98024", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98026", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98027", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98032", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98033", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096" }, { "reference_url": "http://seclists.org/fulldisclosure/2016/Apr/72", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2016/Apr/72" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/libgd/libgd/commit/2bb97f407c1145c850416a3bfbcc8cf124e68a19", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/commit/2bb97f407c1145c850416a3bfbcc8cf124e68a19" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731" }, { "reference_url": "https://security.gentoo.org/glsa/201611-22", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-22" }, { "reference_url": "https://www.exploit-db.com/exploits/39736/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/39736/" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3556", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3556" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3602", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3602" }, { "reference_url": "http://www.securityfocus.com/archive/1/538160/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/538160/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/87087", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/87087" }, { "reference_url": "http://www.securitytracker.com/id/1035659", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035659" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.383127", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.383127" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2987-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2987-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1321893", "reference_id": "1321893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1321893" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822242", "reference_id": "822242", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822242" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/39736.txt", "reference_id": "CVE-2016-3074", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/39736.txt" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3074", "reference_id": "CVE-2016-3074", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3074" }, { "reference_url": "https://security.gentoo.org/glsa/201607-04", "reference_id": "GLSA-201607-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201607-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://usn.ubuntu.com/2987-1/", "reference_id": "USN-2987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2987-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035358?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%2Bdeb7u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%252Bdeb7u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-3074" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9zks-j1fv-ukew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81341?format=api", "vulnerability_id": "VCID-b878-mmfs-e3g1", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10168.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10168.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10168", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70878", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70892", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.7091", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70885", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70929", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70944", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70967", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70951", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70935", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70981", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418986", "reference_id": "1418986", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418986" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3221", "reference_id": "RHSA-2017:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1296", "reference_id": "RHSA-2018:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1296" }, { "reference_url": "https://usn.ubuntu.com/3213-1/", "reference_id": "USN-3213-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3213-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-10168" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b878-mmfs-e3g1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88770?format=api", "vulnerability_id": "VCID-busj-qfth-v7e3", "summary": "gd: buffer overrun", "references": [ { "reference_url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607" }, { "reference_url": "http://fedoranews.org/cms/node/2631", "reference_id": "", "reference_type": "", "scores": [], "url": "http://fedoranews.org/cms/node/2631" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html" }, { "reference_url": "http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2007-0155.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2007-0155.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0455.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0455.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0455", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04925", "scoring_system": "epss", "scoring_elements": "0.89618", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04925", "scoring_system": "epss", "scoring_elements": "0.89579", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04925", "scoring_system": "epss", "scoring_elements": "0.89626", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04925", "scoring_system": "epss", "scoring_elements": "0.89582", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04925", "scoring_system": "epss", "scoring_elements": "0.89596", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04925", "scoring_system": "epss", "scoring_elements": "0.89613", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05488", "scoring_system": "epss", "scoring_elements": "0.90235", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05488", "scoring_system": "epss", "scoring_elements": "0.90222", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05488", "scoring_system": "epss", "scoring_elements": "0.90217", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455" }, { "reference_url": "http://secunia.com/advisories/23916", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23916" }, { "reference_url": "http://secunia.com/advisories/24022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24022" }, { "reference_url": "http://secunia.com/advisories/24052", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24052" }, { "reference_url": "http://secunia.com/advisories/24053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24053" }, { "reference_url": "http://secunia.com/advisories/24107", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24107" }, { "reference_url": "http://secunia.com/advisories/24143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24143" }, { "reference_url": "http://secunia.com/advisories/24151", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24151" }, { "reference_url": "http://secunia.com/advisories/24924", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24924" }, { "reference_url": "http://secunia.com/advisories/24945", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24945" }, { "reference_url": "http://secunia.com/advisories/24965", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24965" }, { "reference_url": "http://secunia.com/advisories/25575", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25575" }, { "reference_url": "http://secunia.com/advisories/29157", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/29157" }, { "reference_url": "http://secunia.com/advisories/42813", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42813" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1030" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1268" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:035", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:035" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:036", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:036" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:038", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:038" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:109", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:109" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0153.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0153.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0162.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0162.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/466166/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/466166/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/22289", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/22289" }, { "reference_url": "http://www.trustix.org/errata/2007/0007", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2007/0007" }, { "reference_url": "http://www.ubuntu.com/usn/usn-473-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-473-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/0400", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/0400" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0022" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=224607", "reference_id": "224607", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=224607" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408982", "reference_id": "408982", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408982" }, { "reference_url": "https://security.archlinux.org/ASA-201701-1", "reference_id": "ASA-201701-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-1" }, { "reference_url": "https://security.archlinux.org/AVG-16", "reference_id": "AVG-16", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-16" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0455", "reference_id": "CVE-2007-0455", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0153", "reference_id": "RHSA-2007:0153", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0153" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0155", "reference_id": "RHSA-2007:0155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0162", "reference_id": "RHSA-2007:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0146", "reference_id": "RHSA-2008:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0146" }, { "reference_url": "https://usn.ubuntu.com/473-1/", "reference_id": "USN-473-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/473-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035355?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4ehv-84qa-fubx" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1" } ], "aliases": [ "CVE-2007-0455" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-busj-qfth-v7e3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81337?format=api", "vulnerability_id": "VCID-cr4d-8dhn-gkgq", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6912.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6912.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6912", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75343", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75346", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75379", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75358", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75401", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75411", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75431", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75409", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75398", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.7544", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417977", "reference_id": "1417977", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417977" }, { "reference_url": "https://usn.ubuntu.com/3213-1/", "reference_id": "USN-3213-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3213-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6912" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cr4d-8dhn-gkgq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41557?format=api", "vulnerability_id": "VCID-ek5b-jujn-bqet", "summary": "Multiple vulnerabilities have been discovered in GD, allowing for the\n execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz" }, { "reference_url": "http://bugs.libgd.org/?do=details&task_id=94", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.libgd.org/?do=details&task_id=94" }, { "reference_url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html" }, { "reference_url": "http://osvdb.org/37744", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/37744" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3473.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3473.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3473", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10285", "scoring_system": "epss", "scoring_elements": "0.93183", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10285", "scoring_system": "epss", "scoring_elements": "0.93167", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10285", "scoring_system": "epss", "scoring_elements": "0.93165", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.12126", "scoring_system": "epss", "scoring_elements": "0.93791", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12126", "scoring_system": "epss", "scoring_elements": "0.93768", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12126", "scoring_system": "epss", "scoring_elements": "0.93802", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12126", "scoring_system": "epss", "scoring_elements": "0.93807", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.12126", "scoring_system": "epss", "scoring_elements": "0.938", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12126", "scoring_system": "epss", "scoring_elements": "0.93778", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12126", "scoring_system": "epss", "scoring_elements": "0.93787", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3473" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473" }, { "reference_url": "http://secunia.com/advisories/25855", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25855" }, { "reference_url": "http://secunia.com/advisories/25860", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25860" }, { "reference_url": "http://secunia.com/advisories/26272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26272" }, { "reference_url": "http://secunia.com/advisories/26390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26390" }, { "reference_url": "http://secunia.com/advisories/26415", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26415" }, { "reference_url": "http://secunia.com/advisories/26467", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26467" }, { "reference_url": "http://secunia.com/advisories/26663", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26663" }, { "reference_url": "http://secunia.com/advisories/26766", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26766" }, { "reference_url": "http://secunia.com/advisories/26856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26856" }, { "reference_url": "http://secunia.com/advisories/29157", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/29157" }, { "reference_url": "http://secunia.com/advisories/30168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30168" }, { "reference_url": "http://secunia.com/advisories/42813", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42813" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200708-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200711-34.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200805-13.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35109", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35109" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1643", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1643" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806" }, { "reference_url": "http://www.libgd.org/ReleaseNote020035", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.libgd.org/ReleaseNote020035" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164" }, { "reference_url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/24651", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/24651" }, { "reference_url": "http://www.trustix.org/errata/2007/0024/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2007/0024/" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2336" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0022" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=276791", "reference_id": "276791", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=276791" }, { "reference_url": "https://security.archlinux.org/ASA-201701-1", "reference_id": "ASA-201701-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-1" }, { "reference_url": "https://security.archlinux.org/AVG-16", "reference_id": "AVG-16", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-16" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3473", "reference_id": "CVE-2007-3473", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3473" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30251.c", "reference_id": "CVE-2007-3473;OSVDB-37744", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30251.c" }, { "reference_url": "https://www.securityfocus.com/bid/24651/info", "reference_id": "CVE-2007-3473;OSVDB-37744", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/24651/info" }, { "reference_url": "https://security.gentoo.org/glsa/200708-05", "reference_id": "GLSA-200708-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200708-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0146", "reference_id": "RHSA-2008:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0146" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035355?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4ehv-84qa-fubx" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1" } ], "aliases": [ "CVE-2007-3473" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ek5b-jujn-bqet" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62347?format=api", "vulnerability_id": "VCID-fcm8-f9e6-83b4", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6207.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6207.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6207", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92453", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.9246", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92468", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92472", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92483", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92488", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92494", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92496", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92505", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359800", "reference_id": "1359800", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359800" }, { "reference_url": "https://security.gentoo.org/glsa/201612-09", "reference_id": "GLSA-201612-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://usn.ubuntu.com/3060-1/", "reference_id": "USN-3060-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3060-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6207" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fcm8-f9e6-83b4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82259?format=api", "vulnerability_id": "VCID-fwyg-v128-k7c9", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9933.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9933.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9933", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93424", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93478", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93458", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93459", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93432", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.9344", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93441", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93452", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93457", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404723", "reference_id": "1404723", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404723" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849038", "reference_id": "849038", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849038" }, { "reference_url": "https://security.archlinux.org/ASA-201611-19", "reference_id": "ASA-201611-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-19" }, { "reference_url": "https://security.archlinux.org/AVG-58", "reference_id": "AVG-58", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-58" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1296", "reference_id": "RHSA-2018:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1296" }, { "reference_url": "https://usn.ubuntu.com/3213-1/", "reference_id": "USN-3213-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3213-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-9933" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fwyg-v128-k7c9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81339?format=api", "vulnerability_id": "VCID-g1b8-dkd3-j3a2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10166.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10166.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10166", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.9225", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92257", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92263", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92266", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92277", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92281", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92287", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92288", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92297", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418983", "reference_id": "1418983", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2519", "reference_id": "RHSA-2019:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3299", "reference_id": "RHSA-2019:3299", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3299" }, { "reference_url": "https://usn.ubuntu.com/3213-1/", "reference_id": "USN-3213-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3213-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-10166" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g1b8-dkd3-j3a2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94855?format=api", "vulnerability_id": "VCID-g3zj-r8ag-a7ej", "summary": "read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38115", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39214", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39006", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39192", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39215", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39134", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39188", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39216", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39179", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.3916", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38115" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991912", "reference_id": "991912", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991912" }, { "reference_url": "https://security.archlinux.org/AVG-2258", "reference_id": "AVG-2258", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2258" }, { "reference_url": "https://usn.ubuntu.com/5068-1/", "reference_id": "USN-5068-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5068-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053054?format=api", "purl": "pkg:deb/debian/libgd2@2.3.3-9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9" } ], "aliases": [ "CVE-2021-38115" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g3zj-r8ag-a7ej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62345?format=api", "vulnerability_id": "VCID-habv-tr8c-rucd", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6128.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6128.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93758", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93767", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93777", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.9378", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93789", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93791", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93796", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93818", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351603", "reference_id": "1351603", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351603" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829062", "reference_id": "829062", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829062" }, { "reference_url": "https://security.gentoo.org/glsa/201612-09", "reference_id": "GLSA-201612-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://usn.ubuntu.com/3030-1/", "reference_id": "USN-3030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3030-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6128" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-habv-tr8c-rucd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62346?format=api", "vulnerability_id": "VCID-hwys-fv79-b7d8", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6132.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6132.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84085", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84116", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84117", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.8414", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84146", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84164", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84158", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84153", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84176", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352544", "reference_id": "1352544", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352544" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829694", "reference_id": "829694", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829694" }, { "reference_url": "https://security.gentoo.org/glsa/201612-09", "reference_id": "GLSA-201612-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-09" }, { "reference_url": "https://usn.ubuntu.com/3060-1/", "reference_id": "USN-3060-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3060-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6132" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hwys-fv79-b7d8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41556?format=api", "vulnerability_id": "VCID-j15c-u5ty-jug1", "summary": "Multiple vulnerabilities have been discovered in GD, allowing for the\n execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz" }, { "reference_url": "http://bugs.libgd.org/?do=details&task_id=89", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.libgd.org/?do=details&task_id=89" }, { "reference_url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html" }, { "reference_url": "http://osvdb.org/37745", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/37745" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3472.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3472.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3472", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05891", "scoring_system": "epss", "scoring_elements": "0.90587", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05891", "scoring_system": "epss", "scoring_elements": "0.90605", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05891", "scoring_system": "epss", "scoring_elements": "0.90593", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09309", "scoring_system": "epss", "scoring_elements": "0.9273", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09309", "scoring_system": "epss", "scoring_elements": "0.9272", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09309", "scoring_system": "epss", "scoring_elements": "0.92727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09309", "scoring_system": "epss", "scoring_elements": "0.92733", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11193", "scoring_system": "epss", "scoring_elements": "0.9349", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11193", "scoring_system": "epss", "scoring_elements": "0.93496", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.11193", "scoring_system": "epss", "scoring_elements": "0.93487", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3472" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472" }, { "reference_url": "http://secunia.com/advisories/25855", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25855" }, { "reference_url": "http://secunia.com/advisories/25860", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25860" }, { "reference_url": "http://secunia.com/advisories/26272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26272" }, { "reference_url": "http://secunia.com/advisories/26390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26390" }, { "reference_url": "http://secunia.com/advisories/26415", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26415" }, { "reference_url": "http://secunia.com/advisories/26467", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26467" }, { "reference_url": "http://secunia.com/advisories/26663", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26663" }, { "reference_url": "http://secunia.com/advisories/26766", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26766" }, { "reference_url": "http://secunia.com/advisories/26856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26856" }, { "reference_url": "http://secunia.com/advisories/29157", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/29157" }, { "reference_url": "http://secunia.com/advisories/30168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30168" }, { "reference_url": "http://secunia.com/advisories/42813", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42813" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200708-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200711-34.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200805-13.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35108", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35108" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1643", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1643" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067" }, { "reference_url": "http://www.libgd.org/ReleaseNote020035", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.libgd.org/ReleaseNote020035" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/24651", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/24651" }, { "reference_url": "http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/" }, { "reference_url": "http://www.trustix.org/errata/2007/0024/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2007/0024/" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2336" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0022" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=276751", "reference_id": "276751", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=276751" }, { "reference_url": "https://security.archlinux.org/ASA-201701-1", "reference_id": "ASA-201701-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-1" }, { "reference_url": "https://security.archlinux.org/AVG-16", "reference_id": "AVG-16", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-16" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3472", "reference_id": "CVE-2007-3472", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3472" }, { "reference_url": "https://security.gentoo.org/glsa/200708-05", "reference_id": "GLSA-200708-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200708-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0146", "reference_id": "RHSA-2008:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0146" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035355?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4ehv-84qa-fubx" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1" } ], "aliases": [ "CVE-2007-3472" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j15c-u5ty-jug1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56173?format=api", "vulnerability_id": "VCID-j52b-eq6b-dqae", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2497.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2497.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2497", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93778", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93787", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93797", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93801", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93809", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93812", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93817", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.9384", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1076676", "reference_id": "1076676", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1076676" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744719", "reference_id": "744719", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744719" }, { "reference_url": "https://security.gentoo.org/glsa/201408-11", "reference_id": "GLSA-201408-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201408-11" }, { "reference_url": "https://security.gentoo.org/glsa/201607-04", "reference_id": "GLSA-201607-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201607-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1326", "reference_id": "RHSA-2014:1326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1327", "reference_id": "RHSA-2014:1327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1765", "reference_id": "RHSA-2014:1765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1766", "reference_id": "RHSA-2014:1766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1766" }, { "reference_url": "https://usn.ubuntu.com/2987-1/", "reference_id": "USN-2987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2987-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035358?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%2Bdeb7u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%252Bdeb7u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035838?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5" } ], "aliases": [ "CVE-2014-2497" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j52b-eq6b-dqae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80313?format=api", "vulnerability_id": "VCID-jhzv-9ey6-gkdz", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html" }, { "reference_url": "http://php.net/ChangeLog-5.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://php.net/ChangeLog-5.php" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8874.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8874.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8874", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88067", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88053", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88054", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.87995", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88005", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88019", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88024", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88044", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.8805", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.8806", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8874" }, { "reference_url": "https://bugs.php.net/bug.php?id=66387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.php.net/bug.php?id=66387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3587", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3587" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2987-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2987-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336772", "reference_id": "1336772", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336772" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824627", "reference_id": "824627", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824627" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8874", "reference_id": "CVE-2015-8874", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8874" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://usn.ubuntu.com/2987-1/", "reference_id": "USN-2987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2987-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2015-8874" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jhzv-9ey6-gkdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93245?format=api", "vulnerability_id": "VCID-jun7-q9ts-ebfe", "summary": "In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says \"In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for development and testing purposes.'", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6363", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62096", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62156", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62155", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62205", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62222", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.6224", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.6223", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62209", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62255", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363" }, { "reference_url": "https://usn.ubuntu.com/5068-1/", "reference_id": "USN-5068-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5068-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052412?format=api", "purl": "pkg:deb/debian/libgd2@2.3.0-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2" } ], "aliases": [ "CVE-2017-6363" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jun7-q9ts-ebfe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80312?format=api", "vulnerability_id": "VCID-k6qv-tnq5-ybd7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7456.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7456.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7456", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79885", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79891", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79912", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.799", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79929", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79938", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79957", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79941", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79933", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79962", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340433", "reference_id": "1340433", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://usn.ubuntu.com/3030-1/", "reference_id": "USN-3030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3030-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2013-7456" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k6qv-tnq5-ybd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80314?format=api", "vulnerability_id": "VCID-ku2g-q6cg-ayhc", "summary": "security update", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8877.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8877.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8877", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84809", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84788", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84714", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84729", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84748", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84751", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84773", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84797", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84793", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8877" }, { "reference_url": "https://bugs.php.net/bug.php?id=70064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.php.net/bug.php?id=70064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877" }, { "reference_url": "https://github.com/libgd/libgd/commit/4751b606fa38edc456d627140898a7ec679fcc24", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/commit/4751b606fa38edc456d627140898a7ec679fcc24" }, { "reference_url": "https://github.com/libgd/libgd/issues/173", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/issues/173" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3587", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3587" }, { "reference_url": "http://www.php.net/ChangeLog-5.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.php.net/ChangeLog-5.php" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2987-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2987-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338907", "reference_id": "1338907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338907" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8877", "reference_id": "CVE-2015-8877", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8877" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://usn.ubuntu.com/2987-1/", "reference_id": "USN-2987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2987-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2015-8877" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ku2g-q6cg-ayhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81584?format=api", "vulnerability_id": "VCID-m3ve-pf4u-9qhh", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6161.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6161.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75659", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75662", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75693", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75673", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75707", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75718", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75742", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75723", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75717", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75755", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353550", "reference_id": "1353550", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353550" }, { "reference_url": "https://usn.ubuntu.com/3030-1/", "reference_id": "USN-3030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3030-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6161" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m3ve-pf4u-9qhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85048?format=api", "vulnerability_id": "VCID-n7w7-16vs-z3gg", "summary": "gd: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5767.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5767.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5767", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04623", "scoring_system": "epss", "scoring_elements": "0.89223", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04623", "scoring_system": "epss", "scoring_elements": "0.89229", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04623", "scoring_system": "epss", "scoring_elements": "0.89244", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04623", "scoring_system": "epss", "scoring_elements": "0.89246", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04623", "scoring_system": "epss", "scoring_elements": "0.89264", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04623", "scoring_system": "epss", "scoring_elements": "0.89269", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04623", "scoring_system": "epss", "scoring_elements": "0.89278", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04623", "scoring_system": "epss", "scoring_elements": "0.89274", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04623", "scoring_system": "epss", "scoring_elements": "0.8927", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04623", "scoring_system": "epss", "scoring_elements": "0.89284", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5767" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351069", "reference_id": "1351069", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2598", "reference_id": "RHSA-2016:2598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035355?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4ehv-84qa-fubx" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1" } ], "aliases": [ "CVE-2016-5767" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7w7-16vs-z3gg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62348?format=api", "vulnerability_id": "VCID-pnee-e13t-57a2", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7568.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7568.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7568", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87398", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87466", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87456", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87452", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87408", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87422", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87423", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87442", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87449", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.8746", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380450", "reference_id": "1380450", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380450" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839659", "reference_id": "839659", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839659" }, { "reference_url": "https://security.archlinux.org/ASA-201611-19", "reference_id": "ASA-201611-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-19" }, { "reference_url": "https://security.archlinux.org/AVG-58", "reference_id": "AVG-58", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-58" }, { "reference_url": "https://security.gentoo.org/glsa/201612-09", "reference_id": "GLSA-201612-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-09" }, { "reference_url": "https://usn.ubuntu.com/3117-1/", "reference_id": "USN-3117-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3117-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-7568" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pnee-e13t-57a2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94885?format=api", "vulnerability_id": "VCID-qqe4-4aja-j7dz", "summary": "gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka LibGD) through 2.3.2 has a double free. NOTE: the vendor's position is \"The GD2 image format is a proprietary image format of libgd. It has to be regarded as being obsolete, and should only be used for development and testing purposes.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-40145", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62326", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62293", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62312", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62302", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62226", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62276", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67515", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67458", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-40145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145" }, { "reference_url": "https://security.archlinux.org/AVG-2258", "reference_id": "AVG-2258", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2258" }, { "reference_url": "https://usn.ubuntu.com/5068-1/", "reference_id": "USN-5068-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5068-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053054?format=api", "purl": "pkg:deb/debian/libgd2@2.3.3-9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9" } ], "aliases": [ "CVE-2021-40145" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qqe4-4aja-j7dz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61525?format=api", "vulnerability_id": "VCID-r7yv-ryzk-z3e8", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n could result in the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000222.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000222.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000222", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75671", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75588", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75623", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75633", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.7564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01215", "scoring_system": "epss", "scoring_elements": "0.78981", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01215", "scoring_system": "epss", "scoring_elements": "0.79007", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01215", "scoring_system": "epss", "scoring_elements": "0.78975", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000222" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1621953", "reference_id": "1621953", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1621953" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906886", "reference_id": "906886", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906886" }, { "reference_url": "https://security.archlinux.org/AVG-865", "reference_id": "AVG-865", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-865" }, { "reference_url": "https://security.gentoo.org/glsa/201903-18", "reference_id": "GLSA-201903-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-18" }, { "reference_url": "https://usn.ubuntu.com/3755-1/", "reference_id": "USN-3755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3755-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049591?format=api", "purl": "pkg:deb/debian/libgd2@2.2.5-5.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2" } ], "aliases": [ "CVE-2018-1000222" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7yv-ryzk-z3e8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81586?format=api", "vulnerability_id": "VCID-s33d-rhg8-wqej", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6905.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6905.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80427", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80434", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80455", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80444", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80474", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80484", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80502", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80487", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.8048", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80509", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6905" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356485", "reference_id": "1356485", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356485" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6905" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s33d-rhg8-wqej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94909?format=api", "vulnerability_id": "VCID-s83u-wk4f-wkfd", "summary": "The GD Graphics Library (aka LibGD) through 2.3.2 has an out-of-bounds read because of the lack of certain gdGetBuf and gdPutBuf return value checks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-40812", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32895", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.33058", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32888", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32935", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32964", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32967", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32929", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32903", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32944", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.33025", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-40812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9", "reference_id": "6f5136821be86e7068fcdf651ae9420b5d42e9a9", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T16:15:07Z/" } ], "url": "https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9" }, { "reference_url": "https://github.com/libgd/libgd/issues/750#issuecomment-914872385", "reference_id": "750#issuecomment-914872385", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T16:15:07Z/" } ], "url": "https://github.com/libgd/libgd/issues/750#issuecomment-914872385" }, { "reference_url": "https://security.archlinux.org/AVG-2258", "reference_id": "AVG-2258", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2258" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00003.html", "reference_id": "msg00003.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T16:15:07Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00003.html" }, { "reference_url": "https://usn.ubuntu.com/7112-1/", "reference_id": "USN-7112-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7112-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053054?format=api", "purl": "pkg:deb/debian/libgd2@2.3.3-9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9" } ], "aliases": [ "CVE-2021-40812" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s83u-wk4f-wkfd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79067?format=api", "vulnerability_id": "VCID-sszm-mvm2-m7ee", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11038.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11038.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11038", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93282", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93262", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93264", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93248", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93256", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10719", "scoring_system": "epss", "scoring_elements": "0.93303", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10719", "scoring_system": "epss", "scoring_elements": "0.93295", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11036", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11036" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724149", "reference_id": "1724149", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724149" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929821", "reference_id": "929821", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2519", "reference_id": "RHSA-2019:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3299", "reference_id": "RHSA-2019:3299", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3299" }, { "reference_url": "https://usn.ubuntu.com/4316-1/", "reference_id": "USN-4316-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4316-1/" }, { "reference_url": "https://usn.ubuntu.com/4316-2/", "reference_id": "USN-4316-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4316-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049591?format=api", "purl": "pkg:deb/debian/libgd2@2.2.5-5.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2" } ], "aliases": [ "CVE-2019-11038" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sszm-mvm2-m7ee" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42237?format=api", "vulnerability_id": "VCID-svg5-jd8s-mbb5", "summary": "PHP contains several vulnerabilities including buffer and integer overflows\n which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3996", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09573", "scoring_system": "epss", "scoring_elements": "0.92838", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09573", "scoring_system": "epss", "scoring_elements": "0.92845", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09573", "scoring_system": "epss", "scoring_elements": "0.92849", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09573", "scoring_system": "epss", "scoring_elements": "0.92847", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09573", "scoring_system": "epss", "scoring_elements": "0.92856", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09573", "scoring_system": "epss", "scoring_elements": "0.92859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09573", "scoring_system": "epss", "scoring_elements": "0.92864", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09573", "scoring_system": "epss", "scoring_elements": "0.92874", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3996" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=278031", "reference_id": "278031", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=278031" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456", "reference_id": "443456", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525", "reference_id": "601525", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525" }, { "reference_url": "https://security.gentoo.org/glsa/200710-02", "reference_id": "GLSA-200710-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200710-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0888", "reference_id": "RHSA-2007:0888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0889", "reference_id": "RHSA-2007:0889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0890", "reference_id": "RHSA-2007:0890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0891", "reference_id": "RHSA-2007:0891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0891" }, { "reference_url": "https://usn.ubuntu.com/557-1/", "reference_id": "USN-557-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/557-1/" }, { "reference_url": "https://usn.ubuntu.com/720-1/", "reference_id": "USN-720-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/720-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035355?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4ehv-84qa-fubx" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1" } ], "aliases": [ "CVE-2007-3996" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-svg5-jd8s-mbb5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41564?format=api", "vulnerability_id": "VCID-szfb-zfrk-4qha", "summary": "Multiple vulnerabilities have been discovered in GD, allowing for the\n execution of arbitrary code.", "references": [ { "reference_url": "http://bugs.libgd.org/?do=details&task_id=48", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.libgd.org/?do=details&task_id=48" }, { "reference_url": "http://bugs.php.net/bug.php?id=40578", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.php.net/bug.php?id=40578" }, { "reference_url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html" }, { "reference_url": "http://osvdb.org/37740", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/37740" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3478.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3478.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3478", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12107", "scoring_system": "epss", "scoring_elements": "0.93761", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12107", "scoring_system": "epss", "scoring_elements": "0.93771", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12107", "scoring_system": "epss", "scoring_elements": "0.9378", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12107", "scoring_system": "epss", "scoring_elements": "0.93783", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.14445", "scoring_system": "epss", "scoring_elements": "0.94433", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.14445", "scoring_system": "epss", "scoring_elements": "0.94448", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.14445", "scoring_system": "epss", "scoring_elements": "0.94425", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.14445", "scoring_system": "epss", "scoring_elements": "0.94428", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.14445", "scoring_system": "epss", "scoring_elements": "0.94431", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3478" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3478" }, { "reference_url": "http://secunia.com/advisories/25855", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25855" }, { "reference_url": "http://secunia.com/advisories/26272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26272" }, { "reference_url": "http://secunia.com/advisories/26390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26390" }, { "reference_url": "http://secunia.com/advisories/26415", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26415" }, { "reference_url": "http://secunia.com/advisories/26467", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26467" }, { "reference_url": "http://secunia.com/advisories/26663", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26663" }, { "reference_url": "http://secunia.com/advisories/26766", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26766" }, { "reference_url": "http://secunia.com/advisories/26856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26856" }, { "reference_url": "http://secunia.com/advisories/30168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30168" }, { "reference_url": "http://secunia.com/advisories/42813", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42813" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200708-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200711-34.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200805-13.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1643", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1643" }, { "reference_url": "http://www.libgd.org/ReleaseNote020035", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.libgd.org/ReleaseNote020035" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded" }, { "reference_url": "http://www.trustix.org/errata/2007/0024/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2007/0024/" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2336" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0022" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=277231", "reference_id": "277231", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277231" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3478", "reference_id": "CVE-2007-3478", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3478" }, { "reference_url": "https://security.gentoo.org/glsa/200708-05", "reference_id": "GLSA-200708-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200708-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035355?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4ehv-84qa-fubx" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1" } ], "aliases": [ "CVE-2007-3478" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-szfb-zfrk-4qha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62344?format=api", "vulnerability_id": "VCID-tfaf-hb2s-fyb9", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5766.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5766.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94782", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94792", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94795", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94797", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94806", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.9481", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94814", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94819", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94825", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351068", "reference_id": "1351068", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351068" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829014", "reference_id": "829014", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829014" }, { "reference_url": "https://security.gentoo.org/glsa/201612-09", "reference_id": "GLSA-201612-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2598", "reference_id": "RHSA-2016:2598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5443", "reference_id": "RHSA-2020:5443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5443" }, { "reference_url": "https://usn.ubuntu.com/3030-1/", "reference_id": "USN-3030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3030-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-5766" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tfaf-hb2s-fyb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41555?format=api", "vulnerability_id": "VCID-tttf-2akk-57ez", "summary": "Multiple vulnerabilities have been discovered in GD, allowing for the\n execution of arbitrary code.", "references": [ { "reference_url": "http://bugs.libgd.org/?do=details&task_id=86", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.libgd.org/?do=details&task_id=86" }, { "reference_url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795", "reference_id": "", "reference_type": "", "scores": [], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html" }, { "reference_url": "http://osvdb.org/35788", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/35788" }, { "reference_url": "http://osvdb.org/36643", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/36643" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2007-0889.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2007-0889.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2756", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06829", "scoring_system": "epss", "scoring_elements": "0.91366", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06829", "scoring_system": "epss", "scoring_elements": "0.91341", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06829", "scoring_system": "epss", "scoring_elements": "0.91343", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07124", "scoring_system": "epss", "scoring_elements": "0.91519", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07124", "scoring_system": "epss", "scoring_elements": "0.91498", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07124", "scoring_system": "epss", "scoring_elements": "0.91538", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07124", "scoring_system": "epss", "scoring_elements": "0.91542", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07124", "scoring_system": "epss", "scoring_elements": "0.91532", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07124", "scoring_system": "epss", "scoring_elements": "0.91505", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07124", "scoring_system": "epss", "scoring_elements": "0.91511", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756" }, { "reference_url": "http://secunia.com/advisories/25353", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25353" }, { "reference_url": "http://secunia.com/advisories/25362", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25362" }, { "reference_url": "http://secunia.com/advisories/25378", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25378" }, { "reference_url": "http://secunia.com/advisories/25535", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25535" }, { "reference_url": "http://secunia.com/advisories/25575", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25575" }, { "reference_url": "http://secunia.com/advisories/25590", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25590" }, { "reference_url": "http://secunia.com/advisories/25646", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25646" }, { "reference_url": "http://secunia.com/advisories/25657", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25657" }, { "reference_url": "http://secunia.com/advisories/25658", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25658" }, { "reference_url": "http://secunia.com/advisories/25787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25787" }, { "reference_url": "http://secunia.com/advisories/25855", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25855" }, { "reference_url": "http://secunia.com/advisories/26048", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26048" }, { "reference_url": "http://secunia.com/advisories/26231", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26231" }, { "reference_url": "http://secunia.com/advisories/26390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26390" }, { "reference_url": "http://secunia.com/advisories/26871", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26871" }, { "reference_url": "http://secunia.com/advisories/26895", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26895" }, { "reference_url": "http://secunia.com/advisories/26930", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26930" }, { "reference_url": "http://secunia.com/advisories/26967", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26967" }, { "reference_url": "http://secunia.com/advisories/27037", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/27037" }, { "reference_url": "http://secunia.com/advisories/27102", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/27102" }, { "reference_url": "http://secunia.com/advisories/27110", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/27110" }, { "reference_url": "http://secunia.com/advisories/27545", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/27545" }, { "reference_url": "http://secunia.com/advisories/29157", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/29157" }, { "reference_url": "http://secunia.com/advisories/30168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30168" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200708-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200711-34.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200805-13.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34420", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34420" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1394" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml" }, { "reference_url": "http://www.libgd.org/ReleaseNote020035", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.libgd.org/ReleaseNote020035" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:122", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:122" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:123", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:123" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:124", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:124" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:187", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:187" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_13_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_13_sr.html" }, { "reference_url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html" }, { "reference_url": "http://www.php.net/releases/5_2_3.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.php.net/releases/5_2_3.php" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0890.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0890.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0891.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0891.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html" }, { "reference_url": "http://www.securityfocus.com/bid/24089", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/24089" }, { "reference_url": "http://www.securitytracker.com/id?1018187", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1018187" }, { "reference_url": "http://www.trustix.org/errata/2007/0019/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2007/0019/" }, { "reference_url": "http://www.trustix.org/errata/2007/0023/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2007/0023/" }, { "reference_url": "http://www.ubuntu.com/usn/usn-473-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-473-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/1904", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/1904" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/1905", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/1905" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2016", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2016" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2336" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/3386", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/3386" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=242033", "reference_id": "242033", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=242033" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584", "reference_id": "425584", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584" }, { "reference_url": "https://security.archlinux.org/ASA-201701-1", "reference_id": "ASA-201701-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-1" }, { "reference_url": "https://security.archlinux.org/AVG-16", "reference_id": "AVG-16", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-16" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2756", "reference_id": "CVE-2007-2756", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2756" }, { "reference_url": "https://security.gentoo.org/glsa/200708-05", "reference_id": "GLSA-200708-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200708-05" }, { "reference_url": "https://security.gentoo.org/glsa/200710-02", "reference_id": "GLSA-200710-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200710-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0889", "reference_id": "RHSA-2007:0889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0890", "reference_id": "RHSA-2007:0890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0890" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0891", "reference_id": "RHSA-2007:0891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0146", "reference_id": "RHSA-2008:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0146" }, { "reference_url": "https://usn.ubuntu.com/473-1/", "reference_id": "USN-473-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/473-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035355?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4ehv-84qa-fubx" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1" } ], "aliases": [ "CVE-2007-2756" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tttf-2akk-57ez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41562?format=api", "vulnerability_id": "VCID-vqee-h72u-hbar", "summary": "Multiple vulnerabilities have been discovered in GD, allowing for the\n execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz" }, { "reference_url": "http://bugs.libgd.org/?do=details&task_id=87", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.libgd.org/?do=details&task_id=87" }, { "reference_url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html" }, { "reference_url": "http://osvdb.org/37741", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/37741" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3476.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3476.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3476", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05321", "scoring_system": "epss", "scoring_elements": "0.90001", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05321", "scoring_system": "epss", "scoring_elements": "0.90003", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05321", "scoring_system": "epss", "scoring_elements": "0.90015", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05321", "scoring_system": "epss", "scoring_elements": "0.90021", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06471", "scoring_system": "epss", "scoring_elements": "0.91081", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06471", "scoring_system": "epss", "scoring_elements": "0.91105", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06471", "scoring_system": "epss", "scoring_elements": "0.91065", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06471", "scoring_system": "epss", "scoring_elements": "0.91071", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06471", "scoring_system": "epss", "scoring_elements": "0.9108", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3476" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476" }, { "reference_url": "http://secunia.com/advisories/25860", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25860" }, { "reference_url": "http://secunia.com/advisories/26272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26272" }, { "reference_url": "http://secunia.com/advisories/26390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26390" }, { "reference_url": "http://secunia.com/advisories/26415", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26415" }, { "reference_url": "http://secunia.com/advisories/26467", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26467" }, { "reference_url": "http://secunia.com/advisories/26663", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26663" }, { "reference_url": "http://secunia.com/advisories/26766", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26766" }, { "reference_url": "http://secunia.com/advisories/26856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26856" }, { "reference_url": "http://secunia.com/advisories/29157", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/29157" }, { "reference_url": "http://secunia.com/advisories/30168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30168" }, { "reference_url": "http://secunia.com/advisories/31168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31168" }, { "reference_url": "http://secunia.com/advisories/42813", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42813" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200708-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200711-34.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200805-13.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1643", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1643" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1613", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1613" }, { "reference_url": "http://www.libgd.org/ReleaseNote020035", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.libgd.org/ReleaseNote020035" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/24651", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/24651" }, { "reference_url": "http://www.trustix.org/errata/2007/0024/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2007/0024/" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0022" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=277201", "reference_id": "277201", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277201" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525", "reference_id": "601525", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3476", "reference_id": "CVE-2007-3476", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3476" }, { "reference_url": "https://security.gentoo.org/glsa/200708-05", "reference_id": "GLSA-200708-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200708-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0146", "reference_id": "RHSA-2008:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0146" }, { "reference_url": "https://usn.ubuntu.com/854-1/", "reference_id": "USN-854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/854-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035355?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4ehv-84qa-fubx" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1" } ], "aliases": [ "CVE-2007-3476" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqee-h72u-hbar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82204?format=api", "vulnerability_id": "VCID-vya2-pzx7-m7c1", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8670.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8670.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8670", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.8199", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82091", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82064", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82056", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82002", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82024", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.8202", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82047", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82054", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82074", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391068", "reference_id": "1391068", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391068" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840805", "reference_id": "840805", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840805" }, { "reference_url": "https://security.archlinux.org/ASA-201611-19", "reference_id": "ASA-201611-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-19" }, { "reference_url": "https://security.archlinux.org/AVG-58", "reference_id": "AVG-58", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-58" }, { "reference_url": "https://usn.ubuntu.com/3117-1/", "reference_id": "USN-3117-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3117-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-8670" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vya2-pzx7-m7c1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81338?format=api", "vulnerability_id": "VCID-x14b-aaj3-nyed", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9317.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9317.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9317", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77859", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77866", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77894", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77876", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77904", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77908", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77935", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77919", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77957", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417987", "reference_id": "1417987", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417987" }, { "reference_url": "https://usn.ubuntu.com/3213-1/", "reference_id": "USN-3213-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3213-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-9317" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x14b-aaj3-nyed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61528?format=api", "vulnerability_id": "VCID-x635-b1cj-m7d7", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n could result in the remote execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6978.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6978.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6978", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.8545", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85545", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85512", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85526", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85525", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85521", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85463", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.8548", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85483", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85503", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/libgd/libgd/commit/553702980ae89c83f2d6e254d62cf82e204956d0", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/commit/553702980ae89c83f2d6e254d62cf82e204956d0" }, { "reference_url": "https://github.com/libgd/libgd/issues/492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/issues/492" }, { "reference_url": "https://github.com/php/php-src/commit/089f7c0bc28d399b0420aa6ef058e4c1c120b2ae", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/php/php-src/commit/089f7c0bc28d399b0420aa6ef058e4c1c120b2ae" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4384" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671390", "reference_id": "1671390", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671390" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920728", "reference_id": "920728", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920728" }, { "reference_url": "https://security.archlinux.org/AVG-865", "reference_id": "AVG-865", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-865" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6978", "reference_id": "CVE-2019-6978", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6978" }, { "reference_url": "https://security.gentoo.org/glsa/201903-18", "reference_id": "GLSA-201903-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2722", "reference_id": "RHSA-2019:2722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3943", "reference_id": "RHSA-2020:3943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4659", "reference_id": "RHSA-2020:4659", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4659" }, { "reference_url": "https://usn.ubuntu.com/3900-1/", "reference_id": "USN-3900-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3900-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049591?format=api", "purl": "pkg:deb/debian/libgd2@2.2.5-5.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2" } ], "aliases": [ "CVE-2019-6978" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x635-b1cj-m7d7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41560?format=api", "vulnerability_id": "VCID-yhfa-jcqy-wkdx", "summary": "Multiple vulnerabilities have been discovered in GD, allowing for the\n execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz" }, { "reference_url": "http://bugs.libgd.org/?do=details&task_id=70", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.libgd.org/?do=details&task_id=70" }, { "reference_url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3475.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3475.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3475", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12094", "scoring_system": "epss", "scoring_elements": "0.93755", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12094", "scoring_system": "epss", "scoring_elements": "0.93764", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12094", "scoring_system": "epss", "scoring_elements": "0.93774", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12094", "scoring_system": "epss", "scoring_elements": "0.93778", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1443", "scoring_system": "epss", "scoring_elements": "0.9443", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1443", "scoring_system": "epss", "scoring_elements": "0.94445", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.1443", "scoring_system": "epss", "scoring_elements": "0.94421", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1443", "scoring_system": "epss", "scoring_elements": "0.94425", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.1443", "scoring_system": "epss", "scoring_elements": "0.94428", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3475" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475" }, { "reference_url": "http://secunia.com/advisories/25860", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25860" }, { "reference_url": "http://secunia.com/advisories/26272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26272" }, { "reference_url": "http://secunia.com/advisories/26390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26390" }, { "reference_url": "http://secunia.com/advisories/26415", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26415" }, { "reference_url": "http://secunia.com/advisories/26467", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26467" }, { "reference_url": "http://secunia.com/advisories/26663", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26663" }, { "reference_url": "http://secunia.com/advisories/26766", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26766" }, { "reference_url": "http://secunia.com/advisories/26856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26856" }, { "reference_url": "http://secunia.com/advisories/29157", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/29157" }, { "reference_url": "http://secunia.com/advisories/30168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30168" }, { "reference_url": "http://secunia.com/advisories/42813", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42813" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200708-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200711-34.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200805-13.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1643", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1643" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9728" }, { "reference_url": "http://www.libgd.org/ReleaseNote020035", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.libgd.org/ReleaseNote020035" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/24651", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/24651" }, { "reference_url": "http://www.trustix.org/errata/2007/0024/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2007/0024/" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0022" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=277181", "reference_id": "277181", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277181" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3475", "reference_id": "CVE-2007-3475", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3475" }, { "reference_url": "https://security.gentoo.org/glsa/200708-05", "reference_id": "GLSA-200708-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200708-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0146", "reference_id": "RHSA-2008:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0146" }, { "reference_url": "https://usn.ubuntu.com/854-1/", "reference_id": "USN-854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/854-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035355?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%2Blenny1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4ehv-84qa-fubx" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3%252Blenny1" } ], "aliases": [ "CVE-2007-3475" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yhfa-jcqy-wkdx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81713?format=api", "vulnerability_id": "VCID-zp5r-wjhe-u7b3", "summary": "gd: NULL pointer dereference in gdImageClone", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14553.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14553.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76696", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.767", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76729", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76711", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76743", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76754", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76762", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76795", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600727", "reference_id": "1600727", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600727" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951287", "reference_id": "951287", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951287" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4659", "reference_id": "RHSA-2020:4659", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4659" }, { "reference_url": "https://usn.ubuntu.com/4316-1/", "reference_id": "USN-4316-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4316-1/" }, { "reference_url": "https://usn.ubuntu.com/4316-2/", "reference_id": "USN-4316-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4316-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052412?format=api", "purl": "pkg:deb/debian/libgd2@2.3.0-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2" } ], "aliases": [ "CVE-2018-14553" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zp5r-wjhe-u7b3" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.33-5.2etch2" }