Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/libwmf@0.2.8.4-13
Typealpm
Namespacearchlinux
Namelibwmf
Version0.2.8.4-13
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version0.2.8.4-14
Latest_non_vulnerable_version0.2.8.4-14
Affected_by_vulnerabilities
0
url VCID-4ehv-84qa-fubx
vulnerability_id VCID-4ehv-84qa-fubx
summary The GD library is prone to a buffer overflow vulnerability.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3546
reference_id
reference_type
scores
0
value 0.04125
scoring_system epss
scoring_elements 0.8858
published_at 2026-04-01T12:55:00Z
1
value 0.04125
scoring_system epss
scoring_elements 0.88589
published_at 2026-04-02T12:55:00Z
2
value 0.04125
scoring_system epss
scoring_elements 0.88606
published_at 2026-04-04T12:55:00Z
3
value 0.04125
scoring_system epss
scoring_elements 0.88608
published_at 2026-04-07T12:55:00Z
4
value 0.04125
scoring_system epss
scoring_elements 0.88627
published_at 2026-04-08T12:55:00Z
5
value 0.04125
scoring_system epss
scoring_elements 0.88631
published_at 2026-04-09T12:55:00Z
6
value 0.04125
scoring_system epss
scoring_elements 0.88643
published_at 2026-04-11T12:55:00Z
7
value 0.04663
scoring_system epss
scoring_elements 0.89327
published_at 2026-04-21T12:55:00Z
8
value 0.04663
scoring_system epss
scoring_elements 0.89322
published_at 2026-04-12T12:55:00Z
9
value 0.04663
scoring_system epss
scoring_elements 0.89319
published_at 2026-04-13T12:55:00Z
10
value 0.04663
scoring_system epss
scoring_elements 0.89332
published_at 2026-04-16T12:55:00Z
11
value 0.04663
scoring_system epss
scoring_elements 0.89331
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=529213
reference_id 529213
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=529213
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534
reference_id 552534
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
reference_id 601525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
6
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
7
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
8
reference_url https://security.gentoo.org/glsa/201001-03
reference_id GLSA-201001-03
reference_type
scores
url https://security.gentoo.org/glsa/201001-03
9
reference_url https://security.gentoo.org/glsa/201006-16
reference_id GLSA-201006-16
reference_type
scores
url https://security.gentoo.org/glsa/201006-16
10
reference_url https://access.redhat.com/errata/RHSA-2010:0003
reference_id RHSA-2010:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0003
11
reference_url https://access.redhat.com/errata/RHSA-2010:0040
reference_id RHSA-2010:0040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0040
12
reference_url https://usn.ubuntu.com/854-1/
reference_id USN-854-1
reference_type
scores
url https://usn.ubuntu.com/854-1/
fixed_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-14
purl pkg:alpm/archlinux/libwmf@0.2.8.4-14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14
aliases CVE-2009-3546
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ehv-84qa-fubx
1
url VCID-5qdc-jjh5-gfba
vulnerability_id VCID-5qdc-jjh5-gfba
summary
Multiple vulnerabilities have been found in libwmf allowing remote
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4588.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4588.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4588
reference_id
reference_type
scores
0
value 0.05715
scoring_system epss
scoring_elements 0.90441
published_at 2026-04-21T12:55:00Z
1
value 0.05715
scoring_system epss
scoring_elements 0.90388
published_at 2026-04-01T12:55:00Z
2
value 0.05715
scoring_system epss
scoring_elements 0.90391
published_at 2026-04-02T12:55:00Z
3
value 0.05715
scoring_system epss
scoring_elements 0.90403
published_at 2026-04-04T12:55:00Z
4
value 0.05715
scoring_system epss
scoring_elements 0.90407
published_at 2026-04-07T12:55:00Z
5
value 0.05715
scoring_system epss
scoring_elements 0.90421
published_at 2026-04-08T12:55:00Z
6
value 0.05715
scoring_system epss
scoring_elements 0.90428
published_at 2026-04-13T12:55:00Z
7
value 0.05715
scoring_system epss
scoring_elements 0.90435
published_at 2026-04-12T12:55:00Z
8
value 0.05715
scoring_system epss
scoring_elements 0.90443
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4588
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1272993
reference_id 1272993
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1272993
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644
reference_id 787644
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644
8
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
9
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
10
reference_url https://security.gentoo.org/glsa/201602-03
reference_id GLSA-201602-03
reference_type
scores
url https://security.gentoo.org/glsa/201602-03
11
reference_url https://access.redhat.com/errata/RHSA-2015:1917
reference_id RHSA-2015:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1917
12
reference_url https://usn.ubuntu.com/2670-1/
reference_id USN-2670-1
reference_type
scores
url https://usn.ubuntu.com/2670-1/
fixed_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-14
purl pkg:alpm/archlinux/libwmf@0.2.8.4-14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14
aliases CVE-2015-4588
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5qdc-jjh5-gfba
2
url VCID-5we4-7e6c-7bb6
vulnerability_id VCID-5we4-7e6c-7bb6
summary
Multiple vulnerabilities have been found in libwmf allowing remote
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4696.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4696.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4696
reference_id
reference_type
scores
0
value 0.01958
scoring_system epss
scoring_elements 0.83528
published_at 2026-04-21T12:55:00Z
1
value 0.01958
scoring_system epss
scoring_elements 0.83426
published_at 2026-04-01T12:55:00Z
2
value 0.01958
scoring_system epss
scoring_elements 0.83439
published_at 2026-04-02T12:55:00Z
3
value 0.01958
scoring_system epss
scoring_elements 0.83453
published_at 2026-04-04T12:55:00Z
4
value 0.01958
scoring_system epss
scoring_elements 0.83452
published_at 2026-04-07T12:55:00Z
5
value 0.01958
scoring_system epss
scoring_elements 0.83476
published_at 2026-04-08T12:55:00Z
6
value 0.01958
scoring_system epss
scoring_elements 0.83486
published_at 2026-04-09T12:55:00Z
7
value 0.01958
scoring_system epss
scoring_elements 0.835
published_at 2026-04-11T12:55:00Z
8
value 0.01958
scoring_system epss
scoring_elements 0.83494
published_at 2026-04-12T12:55:00Z
9
value 0.01958
scoring_system epss
scoring_elements 0.8349
published_at 2026-04-13T12:55:00Z
10
value 0.01958
scoring_system epss
scoring_elements 0.83526
published_at 2026-04-16T12:55:00Z
11
value 0.01958
scoring_system epss
scoring_elements 0.83527
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4696
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1235669
reference_id 1235669
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1235669
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192
reference_id 784192
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192
8
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
9
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
10
reference_url https://security.gentoo.org/glsa/201602-03
reference_id GLSA-201602-03
reference_type
scores
url https://security.gentoo.org/glsa/201602-03
11
reference_url https://access.redhat.com/errata/RHSA-2015:1917
reference_id RHSA-2015:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1917
12
reference_url https://usn.ubuntu.com/2670-1/
reference_id USN-2670-1
reference_type
scores
url https://usn.ubuntu.com/2670-1/
fixed_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-14
purl pkg:alpm/archlinux/libwmf@0.2.8.4-14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14
aliases CVE-2015-4696
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5we4-7e6c-7bb6
3
url VCID-7d1e-wnq6-4qfr
vulnerability_id VCID-7d1e-wnq6-4qfr
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
reference_id
reference_type
scores
url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
1
reference_url http://bugs.libgd.org/?do=details&task_id=74
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=74
2
reference_url http://bugs.libgd.org/?do=details&task_id=92
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=92
3
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
6
reference_url http://osvdb.org/42062
reference_id
reference_type
scores
url http://osvdb.org/42062
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3477.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3477.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3477
reference_id
reference_type
scores
0
value 0.07202
scoring_system epss
scoring_elements 0.91616
published_at 2026-04-21T12:55:00Z
1
value 0.07202
scoring_system epss
scoring_elements 0.91621
published_at 2026-04-16T12:55:00Z
2
value 0.07202
scoring_system epss
scoring_elements 0.91601
published_at 2026-04-12T12:55:00Z
3
value 0.07202
scoring_system epss
scoring_elements 0.91599
published_at 2026-04-13T12:55:00Z
4
value 0.07483
scoring_system epss
scoring_elements 0.91745
published_at 2026-04-01T12:55:00Z
5
value 0.07483
scoring_system epss
scoring_elements 0.91786
published_at 2026-04-09T12:55:00Z
6
value 0.07483
scoring_system epss
scoring_elements 0.91789
published_at 2026-04-11T12:55:00Z
7
value 0.07483
scoring_system epss
scoring_elements 0.91779
published_at 2026-04-08T12:55:00Z
8
value 0.07483
scoring_system epss
scoring_elements 0.91753
published_at 2026-04-02T12:55:00Z
9
value 0.07483
scoring_system epss
scoring_elements 0.91759
published_at 2026-04-04T12:55:00Z
10
value 0.07483
scoring_system epss
scoring_elements 0.91766
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3477
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477
11
reference_url http://secunia.com/advisories/25860
reference_id
reference_type
scores
url http://secunia.com/advisories/25860
12
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
13
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
14
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
15
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
16
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
17
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
18
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
19
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
20
reference_url http://secunia.com/advisories/31168
reference_id
reference_type
scores
url http://secunia.com/advisories/31168
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
23
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
24
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
25
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
26
reference_url http://www.debian.org/security/2008/dsa-1613
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1613
27
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
28
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
29
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
30
reference_url http://www.novell.com/linux/security/advisories/2007_15_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_15_sr.html
31
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
32
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
33
reference_url http://www.securityfocus.com/bid/24651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24651
34
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
35
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277221
reference_id 277221
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277221
37
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
reference_id 601525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
38
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
39
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3477
reference_id CVE-2007-3477
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3477
50
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
51
reference_url https://usn.ubuntu.com/854-1/
reference_id USN-854-1
reference_type
scores
url https://usn.ubuntu.com/854-1/
fixed_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-14
purl pkg:alpm/archlinux/libwmf@0.2.8.4-14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14
aliases CVE-2007-3477
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7d1e-wnq6-4qfr
4
url VCID-9fnx-1dty-4yg9
vulnerability_id VCID-9fnx-1dty-4yg9
summary
Multiple vulnerabilities have been found in libwmf allowing remote
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0848.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0848.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0848
reference_id
reference_type
scores
0
value 0.04681
scoring_system epss
scoring_elements 0.89347
published_at 2026-04-21T12:55:00Z
1
value 0.04681
scoring_system epss
scoring_elements 0.89292
published_at 2026-04-01T12:55:00Z
2
value 0.04681
scoring_system epss
scoring_elements 0.89298
published_at 2026-04-02T12:55:00Z
3
value 0.04681
scoring_system epss
scoring_elements 0.89312
published_at 2026-04-04T12:55:00Z
4
value 0.04681
scoring_system epss
scoring_elements 0.89313
published_at 2026-04-07T12:55:00Z
5
value 0.04681
scoring_system epss
scoring_elements 0.8933
published_at 2026-04-08T12:55:00Z
6
value 0.04681
scoring_system epss
scoring_elements 0.89335
published_at 2026-04-09T12:55:00Z
7
value 0.04681
scoring_system epss
scoring_elements 0.89343
published_at 2026-04-11T12:55:00Z
8
value 0.04681
scoring_system epss
scoring_elements 0.8934
published_at 2026-04-12T12:55:00Z
9
value 0.04681
scoring_system epss
scoring_elements 0.89337
published_at 2026-04-13T12:55:00Z
10
value 0.04681
scoring_system epss
scoring_elements 0.89351
published_at 2026-04-16T12:55:00Z
11
value 0.04681
scoring_system epss
scoring_elements 0.8935
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0848
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1227243
reference_id 1227243
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1227243
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644
reference_id 787644
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644
8
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
9
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
10
reference_url https://security.gentoo.org/glsa/201602-03
reference_id GLSA-201602-03
reference_type
scores
url https://security.gentoo.org/glsa/201602-03
11
reference_url https://access.redhat.com/errata/RHSA-2015:1917
reference_id RHSA-2015:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1917
12
reference_url https://usn.ubuntu.com/2670-1/
reference_id USN-2670-1
reference_type
scores
url https://usn.ubuntu.com/2670-1/
fixed_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-14
purl pkg:alpm/archlinux/libwmf@0.2.8.4-14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14
aliases CVE-2015-0848
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9fnx-1dty-4yg9
5
url VCID-busj-qfth-v7e3
vulnerability_id VCID-busj-qfth-v7e3
summary gd: buffer overrun
references
0
reference_url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607
reference_id
reference_type
scores
url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607
1
reference_url http://fedoranews.org/cms/node/2631
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2631
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
4
reference_url http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html
reference_id
reference_type
scores
url http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2007-0155.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0155.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0455.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0455.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0455
reference_id
reference_type
scores
0
value 0.04925
scoring_system epss
scoring_elements 0.89618
published_at 2026-04-09T12:55:00Z
1
value 0.04925
scoring_system epss
scoring_elements 0.89579
published_at 2026-04-01T12:55:00Z
2
value 0.04925
scoring_system epss
scoring_elements 0.89626
published_at 2026-04-11T12:55:00Z
3
value 0.04925
scoring_system epss
scoring_elements 0.89582
published_at 2026-04-02T12:55:00Z
4
value 0.04925
scoring_system epss
scoring_elements 0.89596
published_at 2026-04-07T12:55:00Z
5
value 0.04925
scoring_system epss
scoring_elements 0.89613
published_at 2026-04-08T12:55:00Z
6
value 0.05488
scoring_system epss
scoring_elements 0.90231
published_at 2026-04-21T12:55:00Z
7
value 0.05488
scoring_system epss
scoring_elements 0.90217
published_at 2026-04-13T12:55:00Z
8
value 0.05488
scoring_system epss
scoring_elements 0.90235
published_at 2026-04-18T12:55:00Z
9
value 0.05488
scoring_system epss
scoring_elements 0.90222
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0455
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455
9
reference_url http://secunia.com/advisories/23916
reference_id
reference_type
scores
url http://secunia.com/advisories/23916
10
reference_url http://secunia.com/advisories/24022
reference_id
reference_type
scores
url http://secunia.com/advisories/24022
11
reference_url http://secunia.com/advisories/24052
reference_id
reference_type
scores
url http://secunia.com/advisories/24052
12
reference_url http://secunia.com/advisories/24053
reference_id
reference_type
scores
url http://secunia.com/advisories/24053
13
reference_url http://secunia.com/advisories/24107
reference_id
reference_type
scores
url http://secunia.com/advisories/24107
14
reference_url http://secunia.com/advisories/24143
reference_id
reference_type
scores
url http://secunia.com/advisories/24143
15
reference_url http://secunia.com/advisories/24151
reference_id
reference_type
scores
url http://secunia.com/advisories/24151
16
reference_url http://secunia.com/advisories/24924
reference_id
reference_type
scores
url http://secunia.com/advisories/24924
17
reference_url http://secunia.com/advisories/24945
reference_id
reference_type
scores
url http://secunia.com/advisories/24945
18
reference_url http://secunia.com/advisories/24965
reference_id
reference_type
scores
url http://secunia.com/advisories/24965
19
reference_url http://secunia.com/advisories/25575
reference_id
reference_type
scores
url http://secunia.com/advisories/25575
20
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url https://issues.rpath.com/browse/RPL-1030
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1030
23
reference_url https://issues.rpath.com/browse/RPL-1268
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1268
24
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:035
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:035
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:036
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:036
27
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:038
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:038
28
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:109
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:109
29
reference_url http://www.redhat.com/support/errata/RHSA-2007-0153.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0153.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2007-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0162.html
31
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
32
reference_url http://www.securityfocus.com/archive/1/466166/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/466166/100/0/threaded
33
reference_url http://www.securityfocus.com/bid/22289
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22289
34
reference_url http://www.trustix.org/errata/2007/0007
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0007
35
reference_url http://www.ubuntu.com/usn/usn-473-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-473-1
36
reference_url http://www.vupen.com/english/advisories/2007/0400
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0400
37
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=224607
reference_id 224607
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=224607
39
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408982
reference_id 408982
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408982
40
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
41
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0455
reference_id CVE-2007-0455
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-0455
56
reference_url https://access.redhat.com/errata/RHSA-2007:0153
reference_id RHSA-2007:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0153
57
reference_url https://access.redhat.com/errata/RHSA-2007:0155
reference_id RHSA-2007:0155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0155
58
reference_url https://access.redhat.com/errata/RHSA-2007:0162
reference_id RHSA-2007:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0162
59
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
60
reference_url https://usn.ubuntu.com/473-1/
reference_id USN-473-1
reference_type
scores
url https://usn.ubuntu.com/473-1/
fixed_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-14
purl pkg:alpm/archlinux/libwmf@0.2.8.4-14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14
aliases CVE-2007-0455
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-busj-qfth-v7e3
6
url VCID-ek5b-jujn-bqet
vulnerability_id VCID-ek5b-jujn-bqet
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
reference_id
reference_type
scores
url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
1
reference_url http://bugs.libgd.org/?do=details&task_id=94
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=94
2
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
5
reference_url http://osvdb.org/37744
reference_id
reference_type
scores
url http://osvdb.org/37744
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3473.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3473.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3473
reference_id
reference_type
scores
0
value 0.10285
scoring_system epss
scoring_elements 0.93196
published_at 2026-04-21T12:55:00Z
1
value 0.10285
scoring_system epss
scoring_elements 0.93188
published_at 2026-04-18T12:55:00Z
2
value 0.10285
scoring_system epss
scoring_elements 0.93165
published_at 2026-04-12T12:55:00Z
3
value 0.10285
scoring_system epss
scoring_elements 0.93167
published_at 2026-04-13T12:55:00Z
4
value 0.10285
scoring_system epss
scoring_elements 0.93183
published_at 2026-04-16T12:55:00Z
5
value 0.12126
scoring_system epss
scoring_elements 0.93768
published_at 2026-04-01T12:55:00Z
6
value 0.12126
scoring_system epss
scoring_elements 0.93807
published_at 2026-04-11T12:55:00Z
7
value 0.12126
scoring_system epss
scoring_elements 0.93802
published_at 2026-04-09T12:55:00Z
8
value 0.12126
scoring_system epss
scoring_elements 0.93778
published_at 2026-04-02T12:55:00Z
9
value 0.12126
scoring_system epss
scoring_elements 0.93787
published_at 2026-04-04T12:55:00Z
10
value 0.12126
scoring_system epss
scoring_elements 0.93791
published_at 2026-04-07T12:55:00Z
11
value 0.12126
scoring_system epss
scoring_elements 0.938
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3473
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473
10
reference_url http://secunia.com/advisories/25855
reference_id
reference_type
scores
url http://secunia.com/advisories/25855
11
reference_url http://secunia.com/advisories/25860
reference_id
reference_type
scores
url http://secunia.com/advisories/25860
12
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
13
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
14
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
15
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
16
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
17
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
18
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
19
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
20
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
23
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
24
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
25
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35109
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35109
26
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806
28
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
29
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
30
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
31
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
33
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
34
reference_url http://www.securityfocus.com/bid/24651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24651
35
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
36
reference_url http://www.vupen.com/english/advisories/2007/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2336
37
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=276791
reference_id 276791
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=276791
39
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
40
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3473
reference_id CVE-2007-3473
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3473
43
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30251.c
reference_id CVE-2007-3473;OSVDB-37744
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30251.c
44
reference_url https://www.securityfocus.com/bid/24651/info
reference_id CVE-2007-3473;OSVDB-37744
reference_type exploit
scores
url https://www.securityfocus.com/bid/24651/info
45
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
46
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
fixed_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-14
purl pkg:alpm/archlinux/libwmf@0.2.8.4-14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14
aliases CVE-2007-3473
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ek5b-jujn-bqet
7
url VCID-evjq-akma-sfhf
vulnerability_id VCID-evjq-akma-sfhf
summary libwmf: Memory allocation failure in wmf_malloc
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9011.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9011
reference_id
reference_type
scores
0
value 0.00491
scoring_system epss
scoring_elements 0.6553
published_at 2026-04-01T12:55:00Z
1
value 0.00491
scoring_system epss
scoring_elements 0.65664
published_at 2026-04-18T12:55:00Z
2
value 0.00491
scoring_system epss
scoring_elements 0.6566
published_at 2026-04-11T12:55:00Z
3
value 0.00491
scoring_system epss
scoring_elements 0.65645
published_at 2026-04-21T12:55:00Z
4
value 0.00491
scoring_system epss
scoring_elements 0.65616
published_at 2026-04-13T12:55:00Z
5
value 0.00491
scoring_system epss
scoring_elements 0.65651
published_at 2026-04-16T12:55:00Z
6
value 0.00491
scoring_system epss
scoring_elements 0.65578
published_at 2026-04-02T12:55:00Z
7
value 0.00491
scoring_system epss
scoring_elements 0.65608
published_at 2026-04-04T12:55:00Z
8
value 0.00491
scoring_system epss
scoring_elements 0.65575
published_at 2026-04-07T12:55:00Z
9
value 0.00491
scoring_system epss
scoring_elements 0.65626
published_at 2026-04-08T12:55:00Z
10
value 0.00491
scoring_system epss
scoring_elements 0.65639
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9011
2
reference_url https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9011
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2016/10/25/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/10/25/1
6
reference_url http://www.securityfocus.com/bid/93860
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/93860
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388450
reference_id 1388450
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388450
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842090
reference_id 842090
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842090
9
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
10
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wvware:libwmf:0.2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wvware:libwmf:0.2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wvware:libwmf:0.2.8.4:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9011
reference_id CVE-2016-9011
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-9011
fixed_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-14
purl pkg:alpm/archlinux/libwmf@0.2.8.4-14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14
aliases CVE-2016-9011
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-evjq-akma-sfhf
8
url VCID-j15c-u5ty-jug1
vulnerability_id VCID-j15c-u5ty-jug1
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
reference_id
reference_type
scores
url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
1
reference_url http://bugs.libgd.org/?do=details&task_id=89
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=89
2
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
5
reference_url http://osvdb.org/37745
reference_id
reference_type
scores
url http://osvdb.org/37745
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3472.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3472.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3472
reference_id
reference_type
scores
0
value 0.05891
scoring_system epss
scoring_elements 0.90599
published_at 2026-04-21T12:55:00Z
1
value 0.05891
scoring_system epss
scoring_elements 0.90605
published_at 2026-04-16T12:55:00Z
2
value 0.05891
scoring_system epss
scoring_elements 0.90587
published_at 2026-04-13T12:55:00Z
3
value 0.05891
scoring_system epss
scoring_elements 0.90593
published_at 2026-04-12T12:55:00Z
4
value 0.05891
scoring_system epss
scoring_elements 0.90602
published_at 2026-04-18T12:55:00Z
5
value 0.09309
scoring_system epss
scoring_elements 0.9272
published_at 2026-04-01T12:55:00Z
6
value 0.09309
scoring_system epss
scoring_elements 0.92727
published_at 2026-04-02T12:55:00Z
7
value 0.09309
scoring_system epss
scoring_elements 0.92733
published_at 2026-04-04T12:55:00Z
8
value 0.09309
scoring_system epss
scoring_elements 0.9273
published_at 2026-04-07T12:55:00Z
9
value 0.11193
scoring_system epss
scoring_elements 0.93496
published_at 2026-04-11T12:55:00Z
10
value 0.11193
scoring_system epss
scoring_elements 0.9349
published_at 2026-04-09T12:55:00Z
11
value 0.11193
scoring_system epss
scoring_elements 0.93487
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3472
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472
10
reference_url http://secunia.com/advisories/25855
reference_id
reference_type
scores
url http://secunia.com/advisories/25855
11
reference_url http://secunia.com/advisories/25860
reference_id
reference_type
scores
url http://secunia.com/advisories/25860
12
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
13
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
14
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
15
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
16
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
17
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
18
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
19
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
20
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
23
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
24
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
25
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35108
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35108
26
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067
28
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
29
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
30
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
31
reference_url http://www.novell.com/linux/security/advisories/2007_15_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_15_sr.html
32
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
34
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
35
reference_url http://www.securityfocus.com/bid/24651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24651
36
reference_url http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/
reference_id
reference_type
scores
url http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/
37
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
38
reference_url http://www.vupen.com/english/advisories/2007/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2336
39
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=276751
reference_id 276751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=276751
41
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
42
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3472
reference_id CVE-2007-3472
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3472
53
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
54
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
fixed_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-14
purl pkg:alpm/archlinux/libwmf@0.2.8.4-14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14
aliases CVE-2007-3472
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j15c-u5ty-jug1
9
url VCID-kym4-etgv-u3bv
vulnerability_id VCID-kym4-etgv-u3bv
summary
libwmf bundles an old GD version which contains a "use-after-free"
    vulnerability.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1364.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1364.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1364
reference_id
reference_type
scores
0
value 0.03145
scoring_system epss
scoring_elements 0.86907
published_at 2026-04-21T12:55:00Z
1
value 0.03145
scoring_system epss
scoring_elements 0.8683
published_at 2026-04-01T12:55:00Z
2
value 0.03145
scoring_system epss
scoring_elements 0.8684
published_at 2026-04-02T12:55:00Z
3
value 0.03145
scoring_system epss
scoring_elements 0.8686
published_at 2026-04-04T12:55:00Z
4
value 0.03145
scoring_system epss
scoring_elements 0.86854
published_at 2026-04-07T12:55:00Z
5
value 0.03145
scoring_system epss
scoring_elements 0.86874
published_at 2026-04-08T12:55:00Z
6
value 0.03145
scoring_system epss
scoring_elements 0.86882
published_at 2026-04-09T12:55:00Z
7
value 0.03145
scoring_system epss
scoring_elements 0.86895
published_at 2026-04-11T12:55:00Z
8
value 0.03145
scoring_system epss
scoring_elements 0.8689
published_at 2026-04-12T12:55:00Z
9
value 0.03145
scoring_system epss
scoring_elements 0.86885
published_at 2026-04-13T12:55:00Z
10
value 0.03145
scoring_system epss
scoring_elements 0.86902
published_at 2026-04-16T12:55:00Z
11
value 0.03145
scoring_system epss
scoring_elements 0.86908
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1364
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496864
reference_id 496864
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496864
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526434
reference_id 526434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526434
5
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
6
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
7
reference_url https://security.gentoo.org/glsa/200907-01
reference_id GLSA-200907-01
reference_type
scores
url https://security.gentoo.org/glsa/200907-01
8
reference_url https://access.redhat.com/errata/RHSA-2009:0457
reference_id RHSA-2009:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0457
9
reference_url https://usn.ubuntu.com/769-1/
reference_id USN-769-1
reference_type
scores
url https://usn.ubuntu.com/769-1/
fixed_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-14
purl pkg:alpm/archlinux/libwmf@0.2.8.4-14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14
aliases CVE-2009-1364
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kym4-etgv-u3bv
10
url VCID-tttf-2akk-57ez
vulnerability_id VCID-tttf-2akk-57ez
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url http://bugs.libgd.org/?do=details&task_id=86
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=86
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
3
reference_url http://osvdb.org/35788
reference_id
reference_type
scores
url http://osvdb.org/35788
4
reference_url http://osvdb.org/36643
reference_id
reference_type
scores
url http://osvdb.org/36643
5
reference_url http://rhn.redhat.com/errata/RHSA-2007-0889.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0889.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2756
reference_id
reference_type
scores
0
value 0.06829
scoring_system epss
scoring_elements 0.91368
published_at 2026-04-21T12:55:00Z
1
value 0.06829
scoring_system epss
scoring_elements 0.91365
published_at 2026-04-18T12:55:00Z
2
value 0.06829
scoring_system epss
scoring_elements 0.91343
published_at 2026-04-12T12:55:00Z
3
value 0.06829
scoring_system epss
scoring_elements 0.91341
published_at 2026-04-13T12:55:00Z
4
value 0.06829
scoring_system epss
scoring_elements 0.91366
published_at 2026-04-16T12:55:00Z
5
value 0.07124
scoring_system epss
scoring_elements 0.91498
published_at 2026-04-01T12:55:00Z
6
value 0.07124
scoring_system epss
scoring_elements 0.91542
published_at 2026-04-11T12:55:00Z
7
value 0.07124
scoring_system epss
scoring_elements 0.91538
published_at 2026-04-09T12:55:00Z
8
value 0.07124
scoring_system epss
scoring_elements 0.91505
published_at 2026-04-02T12:55:00Z
9
value 0.07124
scoring_system epss
scoring_elements 0.91511
published_at 2026-04-04T12:55:00Z
10
value 0.07124
scoring_system epss
scoring_elements 0.91519
published_at 2026-04-07T12:55:00Z
11
value 0.07124
scoring_system epss
scoring_elements 0.91532
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
9
reference_url http://secunia.com/advisories/25353
reference_id
reference_type
scores
url http://secunia.com/advisories/25353
10
reference_url http://secunia.com/advisories/25362
reference_id
reference_type
scores
url http://secunia.com/advisories/25362
11
reference_url http://secunia.com/advisories/25378
reference_id
reference_type
scores
url http://secunia.com/advisories/25378
12
reference_url http://secunia.com/advisories/25535
reference_id
reference_type
scores
url http://secunia.com/advisories/25535
13
reference_url http://secunia.com/advisories/25575
reference_id
reference_type
scores
url http://secunia.com/advisories/25575
14
reference_url http://secunia.com/advisories/25590
reference_id
reference_type
scores
url http://secunia.com/advisories/25590
15
reference_url http://secunia.com/advisories/25646
reference_id
reference_type
scores
url http://secunia.com/advisories/25646
16
reference_url http://secunia.com/advisories/25657
reference_id
reference_type
scores
url http://secunia.com/advisories/25657
17
reference_url http://secunia.com/advisories/25658
reference_id
reference_type
scores
url http://secunia.com/advisories/25658
18
reference_url http://secunia.com/advisories/25787
reference_id
reference_type
scores
url http://secunia.com/advisories/25787
19
reference_url http://secunia.com/advisories/25855
reference_id
reference_type
scores
url http://secunia.com/advisories/25855
20
reference_url http://secunia.com/advisories/26048
reference_id
reference_type
scores
url http://secunia.com/advisories/26048
21
reference_url http://secunia.com/advisories/26231
reference_id
reference_type
scores
url http://secunia.com/advisories/26231
22
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
23
reference_url http://secunia.com/advisories/26871
reference_id
reference_type
scores
url http://secunia.com/advisories/26871
24
reference_url http://secunia.com/advisories/26895
reference_id
reference_type
scores
url http://secunia.com/advisories/26895
25
reference_url http://secunia.com/advisories/26930
reference_id
reference_type
scores
url http://secunia.com/advisories/26930
26
reference_url http://secunia.com/advisories/26967
reference_id
reference_type
scores
url http://secunia.com/advisories/26967
27
reference_url http://secunia.com/advisories/27037
reference_id
reference_type
scores
url http://secunia.com/advisories/27037
28
reference_url http://secunia.com/advisories/27102
reference_id
reference_type
scores
url http://secunia.com/advisories/27102
29
reference_url http://secunia.com/advisories/27110
reference_id
reference_type
scores
url http://secunia.com/advisories/27110
30
reference_url http://secunia.com/advisories/27545
reference_id
reference_type
scores
url http://secunia.com/advisories/27545
31
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
32
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
33
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
34
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
35
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
36
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34420
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34420
37
reference_url https://issues.rpath.com/browse/RPL-1394
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1394
38
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
39
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779
40
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
41
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
42
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
43
reference_url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
44
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
45
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:122
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:122
46
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:123
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:123
47
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:124
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:124
48
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
49
reference_url http://www.novell.com/linux/security/advisories/2007_13_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_13_sr.html
50
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
51
reference_url http://www.php.net/releases/5_2_3.php
reference_id
reference_type
scores
url http://www.php.net/releases/5_2_3.php
52
reference_url http://www.redhat.com/support/errata/RHSA-2007-0890.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0890.html
53
reference_url http://www.redhat.com/support/errata/RHSA-2007-0891.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0891.html
54
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
55
reference_url http://www.securityfocus.com/bid/24089
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24089
56
reference_url http://www.securitytracker.com/id?1018187
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018187
57
reference_url http://www.trustix.org/errata/2007/0019/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0019/
58
reference_url http://www.trustix.org/errata/2007/0023/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0023/
59
reference_url http://www.ubuntu.com/usn/usn-473-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-473-1
60
reference_url http://www.vupen.com/english/advisories/2007/1904
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1904
61
reference_url http://www.vupen.com/english/advisories/2007/1905
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1905
62
reference_url http://www.vupen.com/english/advisories/2007/2016
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2016
63
reference_url http://www.vupen.com/english/advisories/2007/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2336
64
reference_url http://www.vupen.com/english/advisories/2007/3386
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3386
65
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=242033
reference_id 242033
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=242033
66
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584
reference_id 425584
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584
67
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
68
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2756
reference_id CVE-2007-2756
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-2756
71
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
72
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
73
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
74
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
75
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
76
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
77
reference_url https://usn.ubuntu.com/473-1/
reference_id USN-473-1
reference_type
scores
url https://usn.ubuntu.com/473-1/
fixed_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-14
purl pkg:alpm/archlinux/libwmf@0.2.8.4-14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14
aliases CVE-2007-2756
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tttf-2akk-57ez
11
url VCID-v3cm-pjc9-6bhq
vulnerability_id VCID-v3cm-pjc9-6bhq
summary
libwmf is vulnerable to an integer overflow potentially resulting in the
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3376.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3376.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3376
reference_id
reference_type
scores
0
value 0.12232
scoring_system epss
scoring_elements 0.93876
published_at 2026-04-21T12:55:00Z
1
value 0.12232
scoring_system epss
scoring_elements 0.93808
published_at 2026-04-01T12:55:00Z
2
value 0.12232
scoring_system epss
scoring_elements 0.93817
published_at 2026-04-02T12:55:00Z
3
value 0.12232
scoring_system epss
scoring_elements 0.93826
published_at 2026-04-04T12:55:00Z
4
value 0.12232
scoring_system epss
scoring_elements 0.93829
published_at 2026-04-07T12:55:00Z
5
value 0.12232
scoring_system epss
scoring_elements 0.93838
published_at 2026-04-08T12:55:00Z
6
value 0.12232
scoring_system epss
scoring_elements 0.93841
published_at 2026-04-09T12:55:00Z
7
value 0.12232
scoring_system epss
scoring_elements 0.93846
published_at 2026-04-13T12:55:00Z
8
value 0.12232
scoring_system epss
scoring_elements 0.93869
published_at 2026-04-16T12:55:00Z
9
value 0.12232
scoring_system epss
scoring_elements 0.93875
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3376
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618139
reference_id 1618139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618139
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=381538
reference_id 381538
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=381538
5
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
6
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
7
reference_url https://security.gentoo.org/glsa/200608-17
reference_id GLSA-200608-17
reference_type
scores
url https://security.gentoo.org/glsa/200608-17
8
reference_url https://access.redhat.com/errata/RHSA-2006:0597
reference_id RHSA-2006:0597
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0597
9
reference_url https://usn.ubuntu.com/333-1/
reference_id USN-333-1
reference_type
scores
url https://usn.ubuntu.com/333-1/
fixed_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-14
purl pkg:alpm/archlinux/libwmf@0.2.8.4-14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14
aliases CVE-2006-3376
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v3cm-pjc9-6bhq
12
url VCID-zc4g-jn49-63gd
vulnerability_id VCID-zc4g-jn49-63gd
summary
Multiple vulnerabilities have been found in libwmf allowing remote
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4695.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4695.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4695
reference_id
reference_type
scores
0
value 0.01549
scoring_system epss
scoring_elements 0.81448
published_at 2026-04-21T12:55:00Z
1
value 0.01549
scoring_system epss
scoring_elements 0.81346
published_at 2026-04-01T12:55:00Z
2
value 0.01549
scoring_system epss
scoring_elements 0.81355
published_at 2026-04-02T12:55:00Z
3
value 0.01549
scoring_system epss
scoring_elements 0.81377
published_at 2026-04-04T12:55:00Z
4
value 0.01549
scoring_system epss
scoring_elements 0.81375
published_at 2026-04-07T12:55:00Z
5
value 0.01549
scoring_system epss
scoring_elements 0.81403
published_at 2026-04-08T12:55:00Z
6
value 0.01549
scoring_system epss
scoring_elements 0.81408
published_at 2026-04-09T12:55:00Z
7
value 0.01549
scoring_system epss
scoring_elements 0.81429
published_at 2026-04-11T12:55:00Z
8
value 0.01549
scoring_system epss
scoring_elements 0.81417
published_at 2026-04-12T12:55:00Z
9
value 0.01549
scoring_system epss
scoring_elements 0.81409
published_at 2026-04-13T12:55:00Z
10
value 0.01549
scoring_system epss
scoring_elements 0.81446
published_at 2026-04-16T12:55:00Z
11
value 0.01549
scoring_system epss
scoring_elements 0.81447
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4695
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1235665
reference_id 1235665
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1235665
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205
reference_id 784205
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205
8
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
9
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
10
reference_url https://security.gentoo.org/glsa/201602-03
reference_id GLSA-201602-03
reference_type
scores
url https://security.gentoo.org/glsa/201602-03
11
reference_url https://access.redhat.com/errata/RHSA-2015:1917
reference_id RHSA-2015:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1917
12
reference_url https://usn.ubuntu.com/2670-1/
reference_id USN-2670-1
reference_type
scores
url https://usn.ubuntu.com/2670-1/
fixed_packages
0
url pkg:alpm/archlinux/libwmf@0.2.8.4-14
purl pkg:alpm/archlinux/libwmf@0.2.8.4-14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14
aliases CVE-2015-4695
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zc4g-jn49-63gd
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-13