Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1035358?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1035358?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%2Bdeb7u2", "type": "deb", "namespace": "debian", "name": "libgd2", "version": "2.0.36~rc1~dfsg-6.1+deb7u2", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.3.3-9", "latest_non_vulnerable_version": "2.3.3-9", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81340?format=api", "vulnerability_id": "VCID-1pj7-5gy9-97f7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10167.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10167.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10167", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76636", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76639", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76668", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76649", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76681", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76692", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.7672", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.767", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76734", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76739", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00975", "scoring_system": "epss", "scoring_elements": "0.76729", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418984", "reference_id": "1418984", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418984" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3221", "reference_id": "RHSA-2017:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1296", "reference_id": "RHSA-2018:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1296" }, { "reference_url": "https://usn.ubuntu.com/3213-1/", "reference_id": "USN-3213-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3213-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-10167" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1pj7-5gy9-97f7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81583?format=api", "vulnerability_id": "VCID-34yj-pb2j-5faa", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5116.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5116.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85066", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.84967", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.84981", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.84998", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85002", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85025", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85032", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85048", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85046", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85043", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02396", "scoring_system": "epss", "scoring_elements": "0.85064", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340856", "reference_id": "1340856", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340856" }, { "reference_url": "https://usn.ubuntu.com/3030-1/", "reference_id": "USN-3030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3030-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-5116" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-34yj-pb2j-5faa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72442?format=api", "vulnerability_id": "VCID-3bce-bp4m-3bcy", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6362.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6362.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6362", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61451", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61463", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61467", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.80204", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.80212", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.80232", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.8022", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.80248", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.80259", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.80277", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01378", "scoring_system": "epss", "scoring_elements": "0.80262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/libgd/libgd/issues/381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/issues/381" }, { "reference_url": "https://github.com/libgd/libgd/releases/tag/gd-2.2.5", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/releases/tag/gd-2.2.5" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2BLXX7KNRE7ZVQAKGTHHWS33CUCXVUP/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2BLXX7KNRE7ZVQAKGTHHWS33CUCXVUP/" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3961" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489842", "reference_id": "1489842", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489842" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:libgd:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6362", "reference_id": "CVE-2017-6362", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6362" }, { "reference_url": "https://usn.ubuntu.com/3410-1/", "reference_id": "USN-3410-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3410-1/" }, { "reference_url": "https://usn.ubuntu.com/3410-2/", "reference_id": "USN-3410-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3410-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049591?format=api", "purl": "pkg:deb/debian/libgd2@2.2.5-5.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2" } ], "aliases": [ "CVE-2017-6362" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3bce-bp4m-3bcy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61526?format=api", "vulnerability_id": "VCID-3v99-kbeq-47d8", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n could result in the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5711.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5711.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5711", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91953", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.92002", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.92008", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.92005", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91961", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91969", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91988", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91991", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91994", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.91993", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07835", "scoring_system": "epss", "scoring_elements": "0.9199", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535246", "reference_id": "1535246", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535246" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887485", "reference_id": "887485", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887485" }, { "reference_url": "https://security.archlinux.org/AVG-865", "reference_id": "AVG-865", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-865" }, { "reference_url": "https://security.gentoo.org/glsa/201903-18", "reference_id": "GLSA-201903-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1296", "reference_id": "RHSA-2018:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2519", "reference_id": "RHSA-2019:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2519" }, { "reference_url": "https://usn.ubuntu.com/3755-1/", "reference_id": "USN-3755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3755-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049591?format=api", "purl": "pkg:deb/debian/libgd2@2.2.5-5.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2" } ], "aliases": [ "CVE-2018-5711" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3v99-kbeq-47d8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81336?format=api", "vulnerability_id": "VCID-4eyx-7fmr-r7dm", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6906.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6906.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6906", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63448", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63508", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63535", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63551", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63568", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63584", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63571", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63578", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63562", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1435313", "reference_id": "1435313", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1435313" }, { "reference_url": "https://usn.ubuntu.com/3213-1/", "reference_id": "USN-3213-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3213-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6906" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4eyx-7fmr-r7dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61527?format=api", "vulnerability_id": "VCID-6xda-97rd-9bam", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n could result in the remote execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html" }, { "reference_url": "http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html" }, { "reference_url": "http://php.net/ChangeLog-5.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://php.net/ChangeLog-5.php" }, { "reference_url": "http://php.net/ChangeLog-7.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://php.net/ChangeLog-7.php" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6977.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6977.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6977", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.99399", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.99407", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.99403", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.99404", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.99405", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.99408", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.994", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.863", "scoring_system": "epss", "scoring_elements": "0.99402", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6977" }, { "reference_url": "https://bugs.php.net/bug.php?id=77270", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.php.net/bug.php?id=77270" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190315-0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190315-0003/" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4384" }, { "reference_url": "https://www.exploit-db.com/exploits/46677/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/46677/" }, { "reference_url": "http://www.securityfocus.com/bid/106731", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106731" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672207", "reference_id": "1672207", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672207" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920645", "reference_id": "920645", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920645" }, { "reference_url": "https://security.archlinux.org/AVG-865", "reference_id": "AVG-865", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-865" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:storage_automation_store:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:7.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://github.com/cfreal/exploits/blob/1a671d1d8510e93a0b2607261e9b779562585fe2/CVE-2019-6977-imagecolormatch/exploit.php", "reference_id": "CVE-2019-6977", "reference_type": "exploit", "scores": [], "url": "https://github.com/cfreal/exploits/blob/1a671d1d8510e93a0b2607261e9b779562585fe2/CVE-2019-6977-imagecolormatch/exploit.php" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/46677.php", "reference_id": "CVE-2019-6977", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/46677.php" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6977", "reference_id": "CVE-2019-6977", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6977" }, { "reference_url": "https://security.gentoo.org/glsa/201903-18", "reference_id": "GLSA-201903-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2519", "reference_id": "RHSA-2019:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3299", "reference_id": "RHSA-2019:3299", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3299" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4659", "reference_id": "RHSA-2020:4659", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4659" }, { "reference_url": "https://usn.ubuntu.com/3900-1/", "reference_id": "USN-3900-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3900-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049591?format=api", "purl": "pkg:deb/debian/libgd2@2.2.5-5.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2" } ], "aliases": [ "CVE-2019-6977" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xda-97rd-9bam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72904?format=api", "vulnerability_id": "VCID-6ysv-9bmx-w7df", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7890.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7890.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7890", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.96165", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.96193", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.96173", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.96181", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.96183", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.96196", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.96201", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.25333", "scoring_system": "epss", "scoring_elements": "0.962", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.28056", "scoring_system": "epss", "scoring_elements": "0.96486", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.28056", "scoring_system": "epss", "scoring_elements": "0.96487", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.28056", "scoring_system": "epss", "scoring_elements": "0.96475", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.28056", "scoring_system": "epss", "scoring_elements": "0.96482", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7890" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473822", "reference_id": "1473822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473822" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869263", "reference_id": "869263", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0406", "reference_id": "RHSA-2018:0406", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0406" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1296", "reference_id": "RHSA-2018:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1296" }, { "reference_url": "https://usn.ubuntu.com/3389-1/", "reference_id": "USN-3389-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3389-1/" }, { "reference_url": "https://usn.ubuntu.com/3389-2/", "reference_id": "USN-3389-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3389-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049591?format=api", "purl": "pkg:deb/debian/libgd2@2.2.5-5.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2" } ], "aliases": [ "CVE-2017-7890" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ysv-9bmx-w7df" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82203?format=api", "vulnerability_id": "VCID-75xx-y3xu-cqe2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6911.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6911.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6911", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70523", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70618", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70631", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.7064", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70537", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70554", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70532", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70592", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70615", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.706", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70587", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388787", "reference_id": "1388787", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388787" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840806", "reference_id": "840806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840806" }, { "reference_url": "https://security.archlinux.org/ASA-201611-19", "reference_id": "ASA-201611-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-19" }, { "reference_url": "https://security.archlinux.org/AVG-58", "reference_id": "AVG-58", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-58" }, { "reference_url": "https://usn.ubuntu.com/3117-1/", "reference_id": "USN-3117-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3117-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6911" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75xx-y3xu-cqe2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81585?format=api", "vulnerability_id": "VCID-7rvx-8x2z-7kdm", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6214.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6214.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91672", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.9168", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91686", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91707", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91714", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91717", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91719", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91715", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91736", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.91729", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07362", "scoring_system": "epss", "scoring_elements": "0.9173", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356466", "reference_id": "1356466", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356466" }, { "reference_url": "https://usn.ubuntu.com/3060-1/", "reference_id": "USN-3060-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3060-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6214" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7rvx-8x2z-7kdm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47343?format=api", "vulnerability_id": "VCID-9wvm-w1qk-xycw", "summary": "Multiple vulnerabilities have been found in PHP, the worst of which\n could lead to arbitrary code execution, or cause a Denial of Service\n condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9709.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9709.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9709", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94874", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94883", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94886", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94888", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94897", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94901", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94906", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94908", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.9491", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94917", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94921", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94925", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188639", "reference_id": "1188639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188639" }, { "reference_url": "https://security.gentoo.org/glsa/201606-10", "reference_id": "GLSA-201606-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201606-10" }, { "reference_url": "https://security.gentoo.org/glsa/201607-04", "reference_id": "GLSA-201607-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201607-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1053", "reference_id": "RHSA-2015:1053", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1053" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1066", "reference_id": "RHSA-2015:1066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1135", "reference_id": "RHSA-2015:1135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1218", "reference_id": "RHSA-2015:1218", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1218" }, { "reference_url": "https://usn.ubuntu.com/2987-1/", "reference_id": "USN-2987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2987-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035838?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5" } ], "aliases": [ "CVE-2014-9709" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9wvm-w1qk-xycw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56174?format=api", "vulnerability_id": "VCID-9zks-j1fv-ukew", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183263.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183263.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183724.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183724.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html" }, { "reference_url": "http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3074.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3074.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3074", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98042", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98038", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98044", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98019", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98024", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98026", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98027", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98032", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98033", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98037", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096" }, { "reference_url": "http://seclists.org/fulldisclosure/2016/Apr/72", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2016/Apr/72" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/libgd/libgd/commit/2bb97f407c1145c850416a3bfbcc8cf124e68a19", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/commit/2bb97f407c1145c850416a3bfbcc8cf124e68a19" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731" }, { "reference_url": "https://security.gentoo.org/glsa/201611-22", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-22" }, { "reference_url": "https://www.exploit-db.com/exploits/39736/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/39736/" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3556", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3556" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3602", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3602" }, { "reference_url": "http://www.securityfocus.com/archive/1/538160/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/538160/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/87087", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/87087" }, { "reference_url": "http://www.securitytracker.com/id/1035659", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035659" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.383127", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.383127" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2987-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2987-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1321893", "reference_id": "1321893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1321893" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822242", "reference_id": "822242", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822242" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/39736.txt", "reference_id": "CVE-2016-3074", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/39736.txt" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3074", "reference_id": "CVE-2016-3074", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3074" }, { "reference_url": "https://security.gentoo.org/glsa/201607-04", "reference_id": "GLSA-201607-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201607-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://usn.ubuntu.com/2987-1/", "reference_id": "USN-2987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2987-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-3074" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9zks-j1fv-ukew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81341?format=api", "vulnerability_id": "VCID-b878-mmfs-e3g1", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10168.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10168.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10168", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70878", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70892", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.7091", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70885", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70929", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70944", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70967", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70951", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70935", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70981", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00655", "scoring_system": "epss", "scoring_elements": "0.70988", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418986", "reference_id": "1418986", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418986" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3221", "reference_id": "RHSA-2017:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1296", "reference_id": "RHSA-2018:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1296" }, { "reference_url": "https://usn.ubuntu.com/3213-1/", "reference_id": "USN-3213-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3213-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-10168" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b878-mmfs-e3g1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81337?format=api", "vulnerability_id": "VCID-cr4d-8dhn-gkgq", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6912.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6912.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6912", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75343", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75346", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75379", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75358", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75401", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75411", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75431", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75409", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75398", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.7544", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75445", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75434", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417977", "reference_id": "1417977", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417977" }, { "reference_url": "https://usn.ubuntu.com/3213-1/", "reference_id": "USN-3213-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3213-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6912" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cr4d-8dhn-gkgq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62347?format=api", "vulnerability_id": "VCID-fcm8-f9e6-83b4", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6207.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6207.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6207", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92453", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.9246", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92468", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92472", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92483", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92488", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92494", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92496", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92505", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92504", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08719", "scoring_system": "epss", "scoring_elements": "0.92508", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359800", "reference_id": "1359800", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359800" }, { "reference_url": "https://security.gentoo.org/glsa/201612-09", "reference_id": "GLSA-201612-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://usn.ubuntu.com/3060-1/", "reference_id": "USN-3060-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3060-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6207" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fcm8-f9e6-83b4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82259?format=api", "vulnerability_id": "VCID-fwyg-v128-k7c9", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9933.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9933.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9933", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93424", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.9349", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93478", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93484", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93432", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.9344", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93441", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93452", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93457", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93458", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11102", "scoring_system": "epss", "scoring_elements": "0.93459", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404723", "reference_id": "1404723", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404723" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849038", "reference_id": "849038", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849038" }, { "reference_url": "https://security.archlinux.org/ASA-201611-19", "reference_id": "ASA-201611-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-19" }, { "reference_url": "https://security.archlinux.org/AVG-58", "reference_id": "AVG-58", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-58" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1296", "reference_id": "RHSA-2018:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1296" }, { "reference_url": "https://usn.ubuntu.com/3213-1/", "reference_id": "USN-3213-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3213-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-9933" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fwyg-v128-k7c9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81339?format=api", "vulnerability_id": "VCID-g1b8-dkd3-j3a2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10166.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10166.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10166", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.9225", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92257", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92263", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92266", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92277", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92281", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92287", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92288", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08333", "scoring_system": "epss", "scoring_elements": "0.92297", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418983", "reference_id": "1418983", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2519", "reference_id": "RHSA-2019:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3299", "reference_id": "RHSA-2019:3299", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3299" }, { "reference_url": "https://usn.ubuntu.com/3213-1/", "reference_id": "USN-3213-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3213-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-10166" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g1b8-dkd3-j3a2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94855?format=api", "vulnerability_id": "VCID-g3zj-r8ag-a7ej", "summary": "read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38115", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39095", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39006", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39192", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39215", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39134", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39188", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39216", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39179", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.3916", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39214", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39184", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38115" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991912", "reference_id": "991912", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991912" }, { "reference_url": "https://security.archlinux.org/AVG-2258", "reference_id": "AVG-2258", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2258" }, { "reference_url": "https://usn.ubuntu.com/5068-1/", "reference_id": "USN-5068-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5068-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053054?format=api", "purl": "pkg:deb/debian/libgd2@2.3.3-9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9" } ], "aliases": [ "CVE-2021-38115" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g3zj-r8ag-a7ej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62345?format=api", "vulnerability_id": "VCID-habv-tr8c-rucd", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6128.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6128.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93758", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93767", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93777", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.9378", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93789", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93791", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93796", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93818", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93823", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.12098", "scoring_system": "epss", "scoring_elements": "0.93826", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351603", "reference_id": "1351603", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351603" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829062", "reference_id": "829062", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829062" }, { "reference_url": "https://security.gentoo.org/glsa/201612-09", "reference_id": "GLSA-201612-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://usn.ubuntu.com/3030-1/", "reference_id": "USN-3030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3030-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6128" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-habv-tr8c-rucd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62346?format=api", "vulnerability_id": "VCID-hwys-fv79-b7d8", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6132.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6132.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84085", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84116", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84117", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.8414", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84146", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84164", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84158", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84153", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84176", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84177", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02125", "scoring_system": "epss", "scoring_elements": "0.84182", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352544", "reference_id": "1352544", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352544" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829694", "reference_id": "829694", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829694" }, { "reference_url": "https://security.gentoo.org/glsa/201612-09", "reference_id": "GLSA-201612-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-09" }, { "reference_url": "https://usn.ubuntu.com/3060-1/", "reference_id": "USN-3060-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3060-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6132" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hwys-fv79-b7d8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56173?format=api", "vulnerability_id": "VCID-j52b-eq6b-dqae", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2497.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2497.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2497", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93778", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93787", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93797", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93801", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93809", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93812", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93817", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.9384", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93845", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93847", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1076676", "reference_id": "1076676", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1076676" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744719", "reference_id": "744719", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744719" }, { "reference_url": "https://security.gentoo.org/glsa/201408-11", "reference_id": "GLSA-201408-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201408-11" }, { "reference_url": "https://security.gentoo.org/glsa/201607-04", "reference_id": "GLSA-201607-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201607-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1326", "reference_id": "RHSA-2014:1326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1327", "reference_id": "RHSA-2014:1327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1765", "reference_id": "RHSA-2014:1765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1766", "reference_id": "RHSA-2014:1766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1766" }, { "reference_url": "https://usn.ubuntu.com/2987-1/", "reference_id": "USN-2987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2987-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035838?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5" } ], "aliases": [ "CVE-2014-2497" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j52b-eq6b-dqae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80313?format=api", "vulnerability_id": "VCID-jhzv-9ey6-gkdz", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html" }, { "reference_url": "http://php.net/ChangeLog-5.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://php.net/ChangeLog-5.php" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8874.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8874.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8874", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88065", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88054", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88067", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.87995", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88005", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88019", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88024", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88044", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.8805", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.8806", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03775", "scoring_system": "epss", "scoring_elements": "0.88053", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8874" }, { "reference_url": "https://bugs.php.net/bug.php?id=66387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.php.net/bug.php?id=66387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3587", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3587" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2987-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2987-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336772", "reference_id": "1336772", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336772" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824627", "reference_id": "824627", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824627" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8874", "reference_id": "CVE-2015-8874", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8874" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://usn.ubuntu.com/2987-1/", "reference_id": "USN-2987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2987-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2015-8874" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jhzv-9ey6-gkdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93245?format=api", "vulnerability_id": "VCID-jun7-q9ts-ebfe", "summary": "In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says \"In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for development and testing purposes.'", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6363", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62096", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62156", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62155", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62205", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62222", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.6224", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.6223", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62209", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62262", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62246", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363" }, { "reference_url": "https://usn.ubuntu.com/5068-1/", "reference_id": "USN-5068-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5068-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052412?format=api", "purl": "pkg:deb/debian/libgd2@2.3.0-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2" } ], "aliases": [ "CVE-2017-6363" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jun7-q9ts-ebfe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80312?format=api", "vulnerability_id": "VCID-k6qv-tnq5-ybd7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7456.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7456.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7456", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79885", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79891", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79912", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.799", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79929", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79938", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79957", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79941", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79933", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79962", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01328", "scoring_system": "epss", "scoring_elements": "0.79964", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340433", "reference_id": "1340433", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://usn.ubuntu.com/3030-1/", "reference_id": "USN-3030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3030-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2013-7456" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k6qv-tnq5-ybd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80314?format=api", "vulnerability_id": "VCID-ku2g-q6cg-ayhc", "summary": "security update", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8877.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8877.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8877", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84808", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.8481", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84714", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84729", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84748", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84751", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84773", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84797", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84793", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84788", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02317", "scoring_system": "epss", "scoring_elements": "0.84809", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8877" }, { "reference_url": "https://bugs.php.net/bug.php?id=70064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.php.net/bug.php?id=70064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877" }, { "reference_url": "https://github.com/libgd/libgd/commit/4751b606fa38edc456d627140898a7ec679fcc24", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/commit/4751b606fa38edc456d627140898a7ec679fcc24" }, { "reference_url": "https://github.com/libgd/libgd/issues/173", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/issues/173" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3587", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3587" }, { "reference_url": "http://www.php.net/ChangeLog-5.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.php.net/ChangeLog-5.php" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2987-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2987-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338907", "reference_id": "1338907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338907" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8877", "reference_id": "CVE-2015-8877", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8877" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://usn.ubuntu.com/2987-1/", "reference_id": "USN-2987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2987-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2015-8877" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ku2g-q6cg-ayhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81584?format=api", "vulnerability_id": "VCID-m3ve-pf4u-9qhh", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6161.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6161.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75659", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75662", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75693", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75673", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75707", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75718", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75742", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75723", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75717", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75755", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75758", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75744", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353550", "reference_id": "1353550", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353550" }, { "reference_url": "https://usn.ubuntu.com/3030-1/", "reference_id": "USN-3030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3030-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6161" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m3ve-pf4u-9qhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62348?format=api", "vulnerability_id": "VCID-pnee-e13t-57a2", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7568.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7568.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7568", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87398", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87467", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87466", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87469", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87408", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87422", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87423", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87442", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87449", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.8746", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87456", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87452", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380450", "reference_id": "1380450", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380450" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839659", "reference_id": "839659", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839659" }, { "reference_url": "https://security.archlinux.org/ASA-201611-19", "reference_id": "ASA-201611-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-19" }, { "reference_url": "https://security.archlinux.org/AVG-58", "reference_id": "AVG-58", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-58" }, { "reference_url": "https://security.gentoo.org/glsa/201612-09", "reference_id": "GLSA-201612-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-09" }, { "reference_url": "https://usn.ubuntu.com/3117-1/", "reference_id": "USN-3117-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3117-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-7568" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pnee-e13t-57a2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94885?format=api", "vulnerability_id": "VCID-qqe4-4aja-j7dz", "summary": "gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka LibGD) through 2.3.2 has a double free. NOTE: the vendor's position is \"The GD2 image format is a proprietary image format of libgd. It has to be regarded as being obsolete, and should only be used for development and testing purposes.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-40145", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62317", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62302", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62326", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62333", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62226", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62276", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62293", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62312", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67515", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67458", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-40145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145" }, { "reference_url": "https://security.archlinux.org/AVG-2258", "reference_id": "AVG-2258", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2258" }, { "reference_url": "https://usn.ubuntu.com/5068-1/", "reference_id": "USN-5068-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5068-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053054?format=api", "purl": "pkg:deb/debian/libgd2@2.3.3-9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9" } ], "aliases": [ "CVE-2021-40145" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qqe4-4aja-j7dz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61525?format=api", "vulnerability_id": "VCID-r7yv-ryzk-z3e8", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n could result in the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000222.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000222.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000222", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.7566", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75633", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.7564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75671", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75675", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75588", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75623", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01215", "scoring_system": "epss", "scoring_elements": "0.78981", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01215", "scoring_system": "epss", "scoring_elements": "0.79007", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01215", "scoring_system": "epss", "scoring_elements": "0.78975", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000222" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1621953", "reference_id": "1621953", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1621953" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906886", "reference_id": "906886", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906886" }, { "reference_url": "https://security.archlinux.org/AVG-865", "reference_id": "AVG-865", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-865" }, { "reference_url": "https://security.gentoo.org/glsa/201903-18", "reference_id": "GLSA-201903-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-18" }, { "reference_url": "https://usn.ubuntu.com/3755-1/", "reference_id": "USN-3755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3755-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049591?format=api", "purl": "pkg:deb/debian/libgd2@2.2.5-5.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2" } ], "aliases": [ "CVE-2018-1000222" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7yv-ryzk-z3e8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81586?format=api", "vulnerability_id": "VCID-s33d-rhg8-wqej", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6905.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6905.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80427", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80434", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80455", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80444", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80474", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80484", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80502", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80487", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.8048", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80509", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.8051", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01408", "scoring_system": "epss", "scoring_elements": "0.80512", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6905" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356485", "reference_id": "1356485", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356485" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-6905" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s33d-rhg8-wqej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94909?format=api", "vulnerability_id": "VCID-s83u-wk4f-wkfd", "summary": "The GD Graphics Library (aka LibGD) through 2.3.2 has an out-of-bounds read because of the lack of certain gdGetBuf and gdPutBuf return value checks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-40812", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32885", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32935", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32964", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32967", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32929", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32903", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32944", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32922", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32895", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.33025", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.33058", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32888", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-40812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9", "reference_id": "6f5136821be86e7068fcdf651ae9420b5d42e9a9", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T16:15:07Z/" } ], "url": "https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9" }, { "reference_url": "https://github.com/libgd/libgd/issues/750#issuecomment-914872385", "reference_id": "750#issuecomment-914872385", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T16:15:07Z/" } ], "url": "https://github.com/libgd/libgd/issues/750#issuecomment-914872385" }, { "reference_url": "https://security.archlinux.org/AVG-2258", "reference_id": "AVG-2258", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2258" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00003.html", "reference_id": "msg00003.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T16:15:07Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00003.html" }, { "reference_url": "https://usn.ubuntu.com/7112-1/", "reference_id": "USN-7112-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7112-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053054?format=api", "purl": "pkg:deb/debian/libgd2@2.3.3-9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9" } ], "aliases": [ "CVE-2021-40812" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s83u-wk4f-wkfd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79067?format=api", "vulnerability_id": "VCID-sszm-mvm2-m7ee", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11038.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11038.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11038", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93293", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93264", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93282", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93287", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93248", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93256", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.1054", "scoring_system": "epss", "scoring_elements": "0.93262", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10719", "scoring_system": "epss", "scoring_elements": "0.93303", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10719", "scoring_system": "epss", "scoring_elements": "0.93295", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11036", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11036" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724149", "reference_id": "1724149", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724149" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929821", "reference_id": "929821", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2519", "reference_id": "RHSA-2019:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3299", "reference_id": "RHSA-2019:3299", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3299" }, { "reference_url": "https://usn.ubuntu.com/4316-1/", "reference_id": "USN-4316-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4316-1/" }, { "reference_url": "https://usn.ubuntu.com/4316-2/", "reference_id": "USN-4316-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4316-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049591?format=api", "purl": "pkg:deb/debian/libgd2@2.2.5-5.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2" } ], "aliases": [ "CVE-2019-11038" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sszm-mvm2-m7ee" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62344?format=api", "vulnerability_id": "VCID-tfaf-hb2s-fyb9", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5766.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5766.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94782", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94792", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94795", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94797", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94806", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.9481", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94814", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94819", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.16232", "scoring_system": "epss", "scoring_elements": "0.94831", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351068", "reference_id": "1351068", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351068" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829014", "reference_id": "829014", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829014" }, { "reference_url": "https://security.gentoo.org/glsa/201612-09", "reference_id": "GLSA-201612-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2598", "reference_id": "RHSA-2016:2598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5443", "reference_id": "RHSA-2020:5443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5443" }, { "reference_url": "https://usn.ubuntu.com/3030-1/", "reference_id": "USN-3030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3030-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-5766" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tfaf-hb2s-fyb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82204?format=api", "vulnerability_id": "VCID-vya2-pzx7-m7c1", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8670.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8670.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8670", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.8199", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82093", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82056", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82091", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82002", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82024", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.8202", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82047", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82054", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82074", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82064", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391068", "reference_id": "1391068", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391068" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840805", "reference_id": "840805", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840805" }, { "reference_url": "https://security.archlinux.org/ASA-201611-19", "reference_id": "ASA-201611-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-19" }, { "reference_url": "https://security.archlinux.org/AVG-58", "reference_id": "AVG-58", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-58" }, { "reference_url": "https://usn.ubuntu.com/3117-1/", "reference_id": "USN-3117-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3117-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-8670" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vya2-pzx7-m7c1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81338?format=api", "vulnerability_id": "VCID-x14b-aaj3-nyed", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9317.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9317.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9317", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77859", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77866", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77894", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77876", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77904", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77908", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77935", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77919", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77957", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77955", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01088", "scoring_system": "epss", "scoring_elements": "0.77948", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417987", "reference_id": "1417987", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417987" }, { "reference_url": "https://usn.ubuntu.com/3213-1/", "reference_id": "USN-3213-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3213-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-9317" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x14b-aaj3-nyed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61528?format=api", "vulnerability_id": "VCID-x635-b1cj-m7d7", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n could result in the remote execution of arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6978.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6978.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6978", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.8545", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85483", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85526", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85525", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85521", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85545", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.8555", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85463", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.8548", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85503", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02564", "scoring_system": "epss", "scoring_elements": "0.85512", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03442", "scoring_system": "epss", "scoring_elements": "0.87504", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/libgd/libgd/commit/553702980ae89c83f2d6e254d62cf82e204956d0", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/commit/553702980ae89c83f2d6e254d62cf82e204956d0" }, { "reference_url": "https://github.com/libgd/libgd/issues/492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/issues/492" }, { "reference_url": "https://github.com/php/php-src/commit/089f7c0bc28d399b0420aa6ef058e4c1c120b2ae", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/php/php-src/commit/089f7c0bc28d399b0420aa6ef058e4c1c120b2ae" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4384" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671390", "reference_id": "1671390", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671390" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920728", "reference_id": "920728", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920728" }, { "reference_url": "https://security.archlinux.org/AVG-865", "reference_id": "AVG-865", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-865" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6978", "reference_id": "CVE-2019-6978", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6978" }, { "reference_url": "https://security.gentoo.org/glsa/201903-18", "reference_id": "GLSA-201903-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2722", "reference_id": "RHSA-2019:2722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3943", "reference_id": "RHSA-2020:3943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4659", "reference_id": "RHSA-2020:4659", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4659" }, { "reference_url": "https://usn.ubuntu.com/3900-1/", "reference_id": "USN-3900-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3900-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049591?format=api", "purl": "pkg:deb/debian/libgd2@2.2.5-5.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2" } ], "aliases": [ "CVE-2019-6978" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x635-b1cj-m7d7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81713?format=api", "vulnerability_id": "VCID-zp5r-wjhe-u7b3", "summary": "gd: NULL pointer dereference in gdImageClone", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14553.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14553.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76696", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.767", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76729", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76711", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76743", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76754", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76762", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76795", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.768", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00979", "scoring_system": "epss", "scoring_elements": "0.76791", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600727", "reference_id": "1600727", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600727" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951287", "reference_id": "951287", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951287" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4659", "reference_id": "RHSA-2020:4659", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4659" }, { "reference_url": "https://usn.ubuntu.com/4316-1/", "reference_id": "USN-4316-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4316-1/" }, { "reference_url": "https://usn.ubuntu.com/4316-2/", "reference_id": "USN-4316-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4316-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052412?format=api", "purl": "pkg:deb/debian/libgd2@2.3.0-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2" } ], "aliases": [ "CVE-2018-14553" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zp5r-wjhe-u7b3" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47343?format=api", "vulnerability_id": "VCID-9wvm-w1qk-xycw", "summary": "Multiple vulnerabilities have been found in PHP, the worst of which\n could lead to arbitrary code execution, or cause a Denial of Service\n condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9709.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9709.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9709", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94874", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94883", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94886", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94888", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94897", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94901", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94906", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94908", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.9491", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94917", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94921", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.16543", "scoring_system": "epss", "scoring_elements": "0.94925", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188639", "reference_id": "1188639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188639" }, { "reference_url": "https://security.gentoo.org/glsa/201606-10", "reference_id": "GLSA-201606-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201606-10" }, { "reference_url": "https://security.gentoo.org/glsa/201607-04", "reference_id": "GLSA-201607-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201607-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1053", "reference_id": "RHSA-2015:1053", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1053" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1066", "reference_id": "RHSA-2015:1066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1135", "reference_id": "RHSA-2015:1135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1218", "reference_id": "RHSA-2015:1218", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1218" }, { "reference_url": "https://usn.ubuntu.com/2987-1/", "reference_id": "USN-2987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2987-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035358?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%2Bdeb7u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%252Bdeb7u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035838?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5" } ], "aliases": [ "CVE-2014-9709" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9wvm-w1qk-xycw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56174?format=api", "vulnerability_id": "VCID-9zks-j1fv-ukew", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183263.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183263.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183724.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183724.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html" }, { "reference_url": "http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3074.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3074.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3074", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98042", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98038", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98044", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98019", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98024", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98026", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98027", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98032", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98033", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.54698", "scoring_system": "epss", "scoring_elements": "0.98037", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096" }, { "reference_url": "http://seclists.org/fulldisclosure/2016/Apr/72", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2016/Apr/72" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/libgd/libgd/commit/2bb97f407c1145c850416a3bfbcc8cf124e68a19", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libgd/libgd/commit/2bb97f407c1145c850416a3bfbcc8cf124e68a19" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731" }, { "reference_url": "https://security.gentoo.org/glsa/201611-22", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-22" }, { "reference_url": "https://www.exploit-db.com/exploits/39736/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/39736/" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3556", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3556" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3602", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3602" }, { "reference_url": "http://www.securityfocus.com/archive/1/538160/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/538160/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/87087", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/87087" }, { "reference_url": "http://www.securitytracker.com/id/1035659", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035659" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.383127", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.383127" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2987-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2987-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1321893", "reference_id": "1321893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1321893" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822242", "reference_id": "822242", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822242" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/39736.txt", "reference_id": "CVE-2016-3074", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/39736.txt" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3074", "reference_id": "CVE-2016-3074", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3074" }, { "reference_url": "https://security.gentoo.org/glsa/201607-04", "reference_id": "GLSA-201607-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201607-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2750", "reference_id": "RHSA-2016:2750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2750" }, { "reference_url": "https://usn.ubuntu.com/2987-1/", "reference_id": "USN-2987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2987-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035358?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%2Bdeb7u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%252Bdeb7u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035839?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5%2Bdeb8u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%252Bdeb8u11" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036906?format=api", "purl": "pkg:deb/debian/libgd2@2.2.4-2%2Bdeb9u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-2%252Bdeb9u5" } ], "aliases": [ "CVE-2016-3074" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9zks-j1fv-ukew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56173?format=api", "vulnerability_id": "VCID-j52b-eq6b-dqae", "summary": "Multiple vulnerabilities have been found in GD, the worst of which\n allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2497.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2497.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2497", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93778", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93787", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93797", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93801", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93809", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93812", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93817", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.9384", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93845", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93847", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1076676", "reference_id": "1076676", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1076676" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744719", "reference_id": "744719", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744719" }, { "reference_url": "https://security.gentoo.org/glsa/201408-11", "reference_id": "GLSA-201408-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201408-11" }, { "reference_url": "https://security.gentoo.org/glsa/201607-04", "reference_id": "GLSA-201607-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201607-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1326", "reference_id": "RHSA-2014:1326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1327", "reference_id": "RHSA-2014:1327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1765", "reference_id": "RHSA-2014:1765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1766", "reference_id": "RHSA-2014:1766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1766" }, { "reference_url": "https://usn.ubuntu.com/2987-1/", "reference_id": "USN-2987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2987-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035358?format=api", "purl": "pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%2Bdeb7u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9wvm-w1qk-xycw" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-j52b-eq6b-dqae" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%252Bdeb7u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035838?format=api", "purl": "pkg:deb/debian/libgd2@2.1.0-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pj7-5gy9-97f7" }, { "vulnerability": "VCID-34yj-pb2j-5faa" }, { "vulnerability": "VCID-3bce-bp4m-3bcy" }, { "vulnerability": "VCID-3v99-kbeq-47d8" }, { "vulnerability": "VCID-4eyx-7fmr-r7dm" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-6ysv-9bmx-w7df" }, { "vulnerability": "VCID-75xx-y3xu-cqe2" }, { "vulnerability": "VCID-7rvx-8x2z-7kdm" }, { "vulnerability": "VCID-9zks-j1fv-ukew" }, { "vulnerability": "VCID-b878-mmfs-e3g1" }, { "vulnerability": "VCID-cr4d-8dhn-gkgq" }, { "vulnerability": "VCID-fcm8-f9e6-83b4" }, { "vulnerability": "VCID-fwyg-v128-k7c9" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-g3zj-r8ag-a7ej" }, { "vulnerability": "VCID-habv-tr8c-rucd" }, { "vulnerability": "VCID-hwys-fv79-b7d8" }, { "vulnerability": "VCID-jhzv-9ey6-gkdz" }, { "vulnerability": "VCID-jun7-q9ts-ebfe" }, { "vulnerability": "VCID-k6qv-tnq5-ybd7" }, { "vulnerability": "VCID-ku2g-q6cg-ayhc" }, { "vulnerability": "VCID-m3ve-pf4u-9qhh" }, { "vulnerability": "VCID-pnee-e13t-57a2" }, { "vulnerability": "VCID-qqe4-4aja-j7dz" }, { "vulnerability": "VCID-r7yv-ryzk-z3e8" }, { "vulnerability": "VCID-s33d-rhg8-wqej" }, { "vulnerability": "VCID-s83u-wk4f-wkfd" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-tfaf-hb2s-fyb9" }, { "vulnerability": "VCID-vya2-pzx7-m7c1" }, { "vulnerability": "VCID-x14b-aaj3-nyed" }, { "vulnerability": "VCID-x635-b1cj-m7d7" }, { "vulnerability": "VCID-zp5r-wjhe-u7b3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5" } ], "aliases": [ "CVE-2014-2497" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j52b-eq6b-dqae" } ], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-6.1%252Bdeb7u2" }