Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/gd@2.0.33-9.4.el5_1?arch=1
Typerpm
Namespaceredhat
Namegd
Version2.0.33-9.4.el5_1
Qualifiers
arch 1
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2bcm-xg5v-kyaw
vulnerability_id VCID-2bcm-xg5v-kyaw
summary gd: GIF handling buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4484.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4484.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4484
reference_id
reference_type
scores
0
value 0.06436
scoring_system epss
scoring_elements 0.91011
published_at 2026-04-01T12:55:00Z
1
value 0.06436
scoring_system epss
scoring_elements 0.91015
published_at 2026-04-02T12:55:00Z
2
value 0.06436
scoring_system epss
scoring_elements 0.91025
published_at 2026-04-04T12:55:00Z
3
value 0.06436
scoring_system epss
scoring_elements 0.91034
published_at 2026-04-07T12:55:00Z
4
value 0.06436
scoring_system epss
scoring_elements 0.91046
published_at 2026-04-08T12:55:00Z
5
value 0.06436
scoring_system epss
scoring_elements 0.91053
published_at 2026-04-09T12:55:00Z
6
value 0.06436
scoring_system epss
scoring_elements 0.91061
published_at 2026-04-13T12:55:00Z
7
value 0.06436
scoring_system epss
scoring_elements 0.91085
published_at 2026-04-18T12:55:00Z
8
value 0.06436
scoring_system epss
scoring_elements 0.91087
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4484
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384838
reference_id 384838
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384838
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384841
reference_id 384841
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384841
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431568
reference_id 431568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431568
6
reference_url https://access.redhat.com/errata/RHSA-2006:0669
reference_id RHSA-2006:0669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0669
7
reference_url https://access.redhat.com/errata/RHSA-2006:0688
reference_id RHSA-2006:0688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0688
8
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
9
reference_url https://usn.ubuntu.com/342-1/
reference_id USN-342-1
reference_type
scores
url https://usn.ubuntu.com/342-1/
fixed_packages
aliases CVE-2006-4484
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2bcm-xg5v-kyaw
1
url VCID-busj-qfth-v7e3
vulnerability_id VCID-busj-qfth-v7e3
summary gd: buffer overrun
references
0
reference_url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607
reference_id
reference_type
scores
url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607
1
reference_url http://fedoranews.org/cms/node/2631
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2631
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
4
reference_url http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html
reference_id
reference_type
scores
url http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2007-0155.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0155.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0455.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0455.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0455
reference_id
reference_type
scores
0
value 0.04925
scoring_system epss
scoring_elements 0.89618
published_at 2026-04-09T12:55:00Z
1
value 0.04925
scoring_system epss
scoring_elements 0.89579
published_at 2026-04-01T12:55:00Z
2
value 0.04925
scoring_system epss
scoring_elements 0.89626
published_at 2026-04-11T12:55:00Z
3
value 0.04925
scoring_system epss
scoring_elements 0.89582
published_at 2026-04-02T12:55:00Z
4
value 0.04925
scoring_system epss
scoring_elements 0.89596
published_at 2026-04-07T12:55:00Z
5
value 0.04925
scoring_system epss
scoring_elements 0.89613
published_at 2026-04-08T12:55:00Z
6
value 0.05488
scoring_system epss
scoring_elements 0.90231
published_at 2026-04-21T12:55:00Z
7
value 0.05488
scoring_system epss
scoring_elements 0.90217
published_at 2026-04-13T12:55:00Z
8
value 0.05488
scoring_system epss
scoring_elements 0.90235
published_at 2026-04-18T12:55:00Z
9
value 0.05488
scoring_system epss
scoring_elements 0.90222
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0455
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455
9
reference_url http://secunia.com/advisories/23916
reference_id
reference_type
scores
url http://secunia.com/advisories/23916
10
reference_url http://secunia.com/advisories/24022
reference_id
reference_type
scores
url http://secunia.com/advisories/24022
11
reference_url http://secunia.com/advisories/24052
reference_id
reference_type
scores
url http://secunia.com/advisories/24052
12
reference_url http://secunia.com/advisories/24053
reference_id
reference_type
scores
url http://secunia.com/advisories/24053
13
reference_url http://secunia.com/advisories/24107
reference_id
reference_type
scores
url http://secunia.com/advisories/24107
14
reference_url http://secunia.com/advisories/24143
reference_id
reference_type
scores
url http://secunia.com/advisories/24143
15
reference_url http://secunia.com/advisories/24151
reference_id
reference_type
scores
url http://secunia.com/advisories/24151
16
reference_url http://secunia.com/advisories/24924
reference_id
reference_type
scores
url http://secunia.com/advisories/24924
17
reference_url http://secunia.com/advisories/24945
reference_id
reference_type
scores
url http://secunia.com/advisories/24945
18
reference_url http://secunia.com/advisories/24965
reference_id
reference_type
scores
url http://secunia.com/advisories/24965
19
reference_url http://secunia.com/advisories/25575
reference_id
reference_type
scores
url http://secunia.com/advisories/25575
20
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url https://issues.rpath.com/browse/RPL-1030
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1030
23
reference_url https://issues.rpath.com/browse/RPL-1268
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1268
24
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:035
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:035
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:036
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:036
27
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:038
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:038
28
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:109
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:109
29
reference_url http://www.redhat.com/support/errata/RHSA-2007-0153.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0153.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2007-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0162.html
31
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
32
reference_url http://www.securityfocus.com/archive/1/466166/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/466166/100/0/threaded
33
reference_url http://www.securityfocus.com/bid/22289
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22289
34
reference_url http://www.trustix.org/errata/2007/0007
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0007
35
reference_url http://www.ubuntu.com/usn/usn-473-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-473-1
36
reference_url http://www.vupen.com/english/advisories/2007/0400
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0400
37
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=224607
reference_id 224607
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=224607
39
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408982
reference_id 408982
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408982
40
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
41
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0455
reference_id CVE-2007-0455
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-0455
56
reference_url https://access.redhat.com/errata/RHSA-2007:0153
reference_id RHSA-2007:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0153
57
reference_url https://access.redhat.com/errata/RHSA-2007:0155
reference_id RHSA-2007:0155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0155
58
reference_url https://access.redhat.com/errata/RHSA-2007:0162
reference_id RHSA-2007:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0162
59
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
60
reference_url https://usn.ubuntu.com/473-1/
reference_id USN-473-1
reference_type
scores
url https://usn.ubuntu.com/473-1/
fixed_packages
aliases CVE-2007-0455
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-busj-qfth-v7e3
2
url VCID-ek5b-jujn-bqet
vulnerability_id VCID-ek5b-jujn-bqet
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
reference_id
reference_type
scores
url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
1
reference_url http://bugs.libgd.org/?do=details&task_id=94
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=94
2
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
5
reference_url http://osvdb.org/37744
reference_id
reference_type
scores
url http://osvdb.org/37744
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3473.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3473.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3473
reference_id
reference_type
scores
0
value 0.10285
scoring_system epss
scoring_elements 0.93196
published_at 2026-04-21T12:55:00Z
1
value 0.10285
scoring_system epss
scoring_elements 0.93188
published_at 2026-04-18T12:55:00Z
2
value 0.10285
scoring_system epss
scoring_elements 0.93165
published_at 2026-04-12T12:55:00Z
3
value 0.10285
scoring_system epss
scoring_elements 0.93167
published_at 2026-04-13T12:55:00Z
4
value 0.10285
scoring_system epss
scoring_elements 0.93183
published_at 2026-04-16T12:55:00Z
5
value 0.12126
scoring_system epss
scoring_elements 0.93768
published_at 2026-04-01T12:55:00Z
6
value 0.12126
scoring_system epss
scoring_elements 0.93807
published_at 2026-04-11T12:55:00Z
7
value 0.12126
scoring_system epss
scoring_elements 0.93802
published_at 2026-04-09T12:55:00Z
8
value 0.12126
scoring_system epss
scoring_elements 0.93778
published_at 2026-04-02T12:55:00Z
9
value 0.12126
scoring_system epss
scoring_elements 0.93787
published_at 2026-04-04T12:55:00Z
10
value 0.12126
scoring_system epss
scoring_elements 0.93791
published_at 2026-04-07T12:55:00Z
11
value 0.12126
scoring_system epss
scoring_elements 0.938
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3473
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473
10
reference_url http://secunia.com/advisories/25855
reference_id
reference_type
scores
url http://secunia.com/advisories/25855
11
reference_url http://secunia.com/advisories/25860
reference_id
reference_type
scores
url http://secunia.com/advisories/25860
12
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
13
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
14
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
15
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
16
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
17
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
18
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
19
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
20
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
23
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
24
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
25
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35109
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35109
26
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806
28
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
29
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
30
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
31
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
33
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
34
reference_url http://www.securityfocus.com/bid/24651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24651
35
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
36
reference_url http://www.vupen.com/english/advisories/2007/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2336
37
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=276791
reference_id 276791
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=276791
39
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
40
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3473
reference_id CVE-2007-3473
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3473
43
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30251.c
reference_id CVE-2007-3473;OSVDB-37744
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30251.c
44
reference_url https://www.securityfocus.com/bid/24651/info
reference_id CVE-2007-3473;OSVDB-37744
reference_type exploit
scores
url https://www.securityfocus.com/bid/24651/info
45
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
46
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
fixed_packages
aliases CVE-2007-3473
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ek5b-jujn-bqet
3
url VCID-j15c-u5ty-jug1
vulnerability_id VCID-j15c-u5ty-jug1
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
reference_id
reference_type
scores
url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
1
reference_url http://bugs.libgd.org/?do=details&task_id=89
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=89
2
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
5
reference_url http://osvdb.org/37745
reference_id
reference_type
scores
url http://osvdb.org/37745
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3472.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3472.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3472
reference_id
reference_type
scores
0
value 0.05891
scoring_system epss
scoring_elements 0.90599
published_at 2026-04-21T12:55:00Z
1
value 0.05891
scoring_system epss
scoring_elements 0.90605
published_at 2026-04-16T12:55:00Z
2
value 0.05891
scoring_system epss
scoring_elements 0.90587
published_at 2026-04-13T12:55:00Z
3
value 0.05891
scoring_system epss
scoring_elements 0.90593
published_at 2026-04-12T12:55:00Z
4
value 0.05891
scoring_system epss
scoring_elements 0.90602
published_at 2026-04-18T12:55:00Z
5
value 0.09309
scoring_system epss
scoring_elements 0.9272
published_at 2026-04-01T12:55:00Z
6
value 0.09309
scoring_system epss
scoring_elements 0.92727
published_at 2026-04-02T12:55:00Z
7
value 0.09309
scoring_system epss
scoring_elements 0.92733
published_at 2026-04-04T12:55:00Z
8
value 0.09309
scoring_system epss
scoring_elements 0.9273
published_at 2026-04-07T12:55:00Z
9
value 0.11193
scoring_system epss
scoring_elements 0.93496
published_at 2026-04-11T12:55:00Z
10
value 0.11193
scoring_system epss
scoring_elements 0.9349
published_at 2026-04-09T12:55:00Z
11
value 0.11193
scoring_system epss
scoring_elements 0.93487
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3472
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472
10
reference_url http://secunia.com/advisories/25855
reference_id
reference_type
scores
url http://secunia.com/advisories/25855
11
reference_url http://secunia.com/advisories/25860
reference_id
reference_type
scores
url http://secunia.com/advisories/25860
12
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
13
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
14
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
15
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
16
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
17
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
18
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
19
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
20
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
23
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
24
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
25
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35108
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35108
26
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067
28
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
29
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
30
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
31
reference_url http://www.novell.com/linux/security/advisories/2007_15_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_15_sr.html
32
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
34
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
35
reference_url http://www.securityfocus.com/bid/24651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24651
36
reference_url http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/
reference_id
reference_type
scores
url http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/
37
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
38
reference_url http://www.vupen.com/english/advisories/2007/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2336
39
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=276751
reference_id 276751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=276751
41
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
42
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3472
reference_id CVE-2007-3472
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3472
53
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
54
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
fixed_packages
aliases CVE-2007-3472
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j15c-u5ty-jug1
4
url VCID-tttf-2akk-57ez
vulnerability_id VCID-tttf-2akk-57ez
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url http://bugs.libgd.org/?do=details&task_id=86
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=86
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
3
reference_url http://osvdb.org/35788
reference_id
reference_type
scores
url http://osvdb.org/35788
4
reference_url http://osvdb.org/36643
reference_id
reference_type
scores
url http://osvdb.org/36643
5
reference_url http://rhn.redhat.com/errata/RHSA-2007-0889.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0889.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2756
reference_id
reference_type
scores
0
value 0.06829
scoring_system epss
scoring_elements 0.91368
published_at 2026-04-21T12:55:00Z
1
value 0.06829
scoring_system epss
scoring_elements 0.91365
published_at 2026-04-18T12:55:00Z
2
value 0.06829
scoring_system epss
scoring_elements 0.91343
published_at 2026-04-12T12:55:00Z
3
value 0.06829
scoring_system epss
scoring_elements 0.91341
published_at 2026-04-13T12:55:00Z
4
value 0.06829
scoring_system epss
scoring_elements 0.91366
published_at 2026-04-16T12:55:00Z
5
value 0.07124
scoring_system epss
scoring_elements 0.91498
published_at 2026-04-01T12:55:00Z
6
value 0.07124
scoring_system epss
scoring_elements 0.91542
published_at 2026-04-11T12:55:00Z
7
value 0.07124
scoring_system epss
scoring_elements 0.91538
published_at 2026-04-09T12:55:00Z
8
value 0.07124
scoring_system epss
scoring_elements 0.91505
published_at 2026-04-02T12:55:00Z
9
value 0.07124
scoring_system epss
scoring_elements 0.91511
published_at 2026-04-04T12:55:00Z
10
value 0.07124
scoring_system epss
scoring_elements 0.91519
published_at 2026-04-07T12:55:00Z
11
value 0.07124
scoring_system epss
scoring_elements 0.91532
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
9
reference_url http://secunia.com/advisories/25353
reference_id
reference_type
scores
url http://secunia.com/advisories/25353
10
reference_url http://secunia.com/advisories/25362
reference_id
reference_type
scores
url http://secunia.com/advisories/25362
11
reference_url http://secunia.com/advisories/25378
reference_id
reference_type
scores
url http://secunia.com/advisories/25378
12
reference_url http://secunia.com/advisories/25535
reference_id
reference_type
scores
url http://secunia.com/advisories/25535
13
reference_url http://secunia.com/advisories/25575
reference_id
reference_type
scores
url http://secunia.com/advisories/25575
14
reference_url http://secunia.com/advisories/25590
reference_id
reference_type
scores
url http://secunia.com/advisories/25590
15
reference_url http://secunia.com/advisories/25646
reference_id
reference_type
scores
url http://secunia.com/advisories/25646
16
reference_url http://secunia.com/advisories/25657
reference_id
reference_type
scores
url http://secunia.com/advisories/25657
17
reference_url http://secunia.com/advisories/25658
reference_id
reference_type
scores
url http://secunia.com/advisories/25658
18
reference_url http://secunia.com/advisories/25787
reference_id
reference_type
scores
url http://secunia.com/advisories/25787
19
reference_url http://secunia.com/advisories/25855
reference_id
reference_type
scores
url http://secunia.com/advisories/25855
20
reference_url http://secunia.com/advisories/26048
reference_id
reference_type
scores
url http://secunia.com/advisories/26048
21
reference_url http://secunia.com/advisories/26231
reference_id
reference_type
scores
url http://secunia.com/advisories/26231
22
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
23
reference_url http://secunia.com/advisories/26871
reference_id
reference_type
scores
url http://secunia.com/advisories/26871
24
reference_url http://secunia.com/advisories/26895
reference_id
reference_type
scores
url http://secunia.com/advisories/26895
25
reference_url http://secunia.com/advisories/26930
reference_id
reference_type
scores
url http://secunia.com/advisories/26930
26
reference_url http://secunia.com/advisories/26967
reference_id
reference_type
scores
url http://secunia.com/advisories/26967
27
reference_url http://secunia.com/advisories/27037
reference_id
reference_type
scores
url http://secunia.com/advisories/27037
28
reference_url http://secunia.com/advisories/27102
reference_id
reference_type
scores
url http://secunia.com/advisories/27102
29
reference_url http://secunia.com/advisories/27110
reference_id
reference_type
scores
url http://secunia.com/advisories/27110
30
reference_url http://secunia.com/advisories/27545
reference_id
reference_type
scores
url http://secunia.com/advisories/27545
31
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
32
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
33
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
34
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
35
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
36
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34420
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34420
37
reference_url https://issues.rpath.com/browse/RPL-1394
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1394
38
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
39
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779
40
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
41
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
42
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
43
reference_url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
44
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
45
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:122
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:122
46
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:123
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:123
47
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:124
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:124
48
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
49
reference_url http://www.novell.com/linux/security/advisories/2007_13_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_13_sr.html
50
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
51
reference_url http://www.php.net/releases/5_2_3.php
reference_id
reference_type
scores
url http://www.php.net/releases/5_2_3.php
52
reference_url http://www.redhat.com/support/errata/RHSA-2007-0890.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0890.html
53
reference_url http://www.redhat.com/support/errata/RHSA-2007-0891.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0891.html
54
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
55
reference_url http://www.securityfocus.com/bid/24089
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24089
56
reference_url http://www.securitytracker.com/id?1018187
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018187
57
reference_url http://www.trustix.org/errata/2007/0019/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0019/
58
reference_url http://www.trustix.org/errata/2007/0023/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0023/
59
reference_url http://www.ubuntu.com/usn/usn-473-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-473-1
60
reference_url http://www.vupen.com/english/advisories/2007/1904
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1904
61
reference_url http://www.vupen.com/english/advisories/2007/1905
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1905
62
reference_url http://www.vupen.com/english/advisories/2007/2016
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2016
63
reference_url http://www.vupen.com/english/advisories/2007/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2336
64
reference_url http://www.vupen.com/english/advisories/2007/3386
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3386
65
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=242033
reference_id 242033
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=242033
66
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584
reference_id 425584
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584
67
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
68
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2756
reference_id CVE-2007-2756
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-2756
71
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
72
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
73
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
74
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
75
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
76
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
77
reference_url https://usn.ubuntu.com/473-1/
reference_id USN-473-1
reference_type
scores
url https://usn.ubuntu.com/473-1/
fixed_packages
aliases CVE-2007-2756
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tttf-2akk-57ez
5
url VCID-vqee-h72u-hbar
vulnerability_id VCID-vqee-h72u-hbar
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
reference_id
reference_type
scores
url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
1
reference_url http://bugs.libgd.org/?do=details&task_id=87
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=87
2
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
5
reference_url http://osvdb.org/37741
reference_id
reference_type
scores
url http://osvdb.org/37741
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3476.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3476.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3476
reference_id
reference_type
scores
0
value 0.05321
scoring_system epss
scoring_elements 0.90003
published_at 2026-04-02T12:55:00Z
1
value 0.05321
scoring_system epss
scoring_elements 0.90015
published_at 2026-04-04T12:55:00Z
2
value 0.05321
scoring_system epss
scoring_elements 0.90021
published_at 2026-04-07T12:55:00Z
3
value 0.05321
scoring_system epss
scoring_elements 0.90001
published_at 2026-04-01T12:55:00Z
4
value 0.06471
scoring_system epss
scoring_elements 0.91081
published_at 2026-04-13T12:55:00Z
5
value 0.06471
scoring_system epss
scoring_elements 0.91105
published_at 2026-04-18T12:55:00Z
6
value 0.06471
scoring_system epss
scoring_elements 0.91107
published_at 2026-04-21T12:55:00Z
7
value 0.06471
scoring_system epss
scoring_elements 0.91065
published_at 2026-04-08T12:55:00Z
8
value 0.06471
scoring_system epss
scoring_elements 0.91071
published_at 2026-04-09T12:55:00Z
9
value 0.06471
scoring_system epss
scoring_elements 0.9108
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3476
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476
10
reference_url http://secunia.com/advisories/25860
reference_id
reference_type
scores
url http://secunia.com/advisories/25860
11
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
12
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
13
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
14
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
15
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
16
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
17
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
18
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
19
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
20
reference_url http://secunia.com/advisories/31168
reference_id
reference_type
scores
url http://secunia.com/advisories/31168
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
23
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
24
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
25
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
26
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348
27
reference_url http://www.debian.org/security/2008/dsa-1613
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1613
28
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
29
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
30
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
31
reference_url http://www.novell.com/linux/security/advisories/2007_15_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_15_sr.html
32
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
34
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
35
reference_url http://www.securityfocus.com/bid/24651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24651
36
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
37
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277201
reference_id 277201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277201
39
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
reference_id 601525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3476
reference_id CVE-2007-3476
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3476
42
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
43
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
44
reference_url https://usn.ubuntu.com/854-1/
reference_id USN-854-1
reference_type
scores
url https://usn.ubuntu.com/854-1/
fixed_packages
aliases CVE-2007-3476
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqee-h72u-hbar
6
url VCID-yhfa-jcqy-wkdx
vulnerability_id VCID-yhfa-jcqy-wkdx
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
reference_id
reference_type
scores
url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
1
reference_url http://bugs.libgd.org/?do=details&task_id=70
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=70
2
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3475.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3475.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3475
reference_id
reference_type
scores
0
value 0.12094
scoring_system epss
scoring_elements 0.93774
published_at 2026-04-04T12:55:00Z
1
value 0.12094
scoring_system epss
scoring_elements 0.93778
published_at 2026-04-07T12:55:00Z
2
value 0.12094
scoring_system epss
scoring_elements 0.93755
published_at 2026-04-01T12:55:00Z
3
value 0.12094
scoring_system epss
scoring_elements 0.93764
published_at 2026-04-02T12:55:00Z
4
value 0.1443
scoring_system epss
scoring_elements 0.9443
published_at 2026-04-13T12:55:00Z
5
value 0.1443
scoring_system epss
scoring_elements 0.94445
published_at 2026-04-16T12:55:00Z
6
value 0.1443
scoring_system epss
scoring_elements 0.94449
published_at 2026-04-18T12:55:00Z
7
value 0.1443
scoring_system epss
scoring_elements 0.94452
published_at 2026-04-21T12:55:00Z
8
value 0.1443
scoring_system epss
scoring_elements 0.94421
published_at 2026-04-08T12:55:00Z
9
value 0.1443
scoring_system epss
scoring_elements 0.94425
published_at 2026-04-09T12:55:00Z
10
value 0.1443
scoring_system epss
scoring_elements 0.94428
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3475
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475
9
reference_url http://secunia.com/advisories/25860
reference_id
reference_type
scores
url http://secunia.com/advisories/25860
10
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
11
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
12
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
13
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
14
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
15
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
16
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
17
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
18
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
19
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
20
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
21
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
22
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
23
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
24
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9728
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9728
25
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
27
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
28
reference_url http://www.novell.com/linux/security/advisories/2007_15_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_15_sr.html
29
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
31
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
32
reference_url http://www.securityfocus.com/bid/24651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24651
33
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
34
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277181
reference_id 277181
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277181
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3475
reference_id CVE-2007-3475
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3475
38
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
39
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
40
reference_url https://usn.ubuntu.com/854-1/
reference_id USN-854-1
reference_type
scores
url https://usn.ubuntu.com/854-1/
fixed_packages
aliases CVE-2007-3475
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yhfa-jcqy-wkdx
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gd@2.0.33-9.4.el5_1%3Farch=1