Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/927389?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/927389?format=api", "purl": "pkg:deb/debian/libgd2@2.0.30-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "libgd2", "version": "2.0.30-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.0.33-1", "latest_non_vulnerable_version": "2.3.3-13", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89385?format=api", "vulnerability_id": "VCID-gcg3-b5bm-73dw", "summary": "security flaw", "references": [ { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=109882489302099&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=109882489302099&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0990.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0990.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0990", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20603", "scoring_system": "epss", "scoring_elements": "0.95575", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.20603", "scoring_system": "epss", "scoring_elements": "0.95544", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20603", "scoring_system": "epss", "scoring_elements": "0.95553", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20603", "scoring_system": "epss", "scoring_elements": "0.95558", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20603", "scoring_system": "epss", "scoring_elements": "0.95561", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20603", "scoring_system": "epss", "scoring_elements": "0.95568", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20603", "scoring_system": "epss", "scoring_elements": "0.95571", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.21209", "scoring_system": "epss", "scoring_elements": "0.95684", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.21209", "scoring_system": "epss", "scoring_elements": "0.95665", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.21209", "scoring_system": "epss", "scoring_elements": "0.95668", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.21209", "scoring_system": "epss", "scoring_elements": "0.95676", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.21209", "scoring_system": "epss", "scoring_elements": "0.9568", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.21209", "scoring_system": "epss", "scoring_elements": "0.95682", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0990" }, { "reference_url": "http://secunia.com/advisories/18717", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18717" }, { "reference_url": "http://secunia.com/advisories/20824", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/20824" }, { "reference_url": "http://secunia.com/advisories/20866", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/20866" }, { "reference_url": "http://secunia.com/advisories/21050", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/21050" }, { "reference_url": "http://secunia.com/advisories/23783", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23783" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17866", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17866" }, { "reference_url": "https://issues.rpath.com/browse/RPL-939", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-939" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1260" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9952", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9952" }, { "reference_url": "https://www.ubuntu.com/usn/usn-11-1/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.ubuntu.com/usn/usn-11-1/" }, { "reference_url": "https://www.ubuntu.com/usn/usn-25-1/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.ubuntu.com/usn/usn-25-1/" }, { "reference_url": "http://www.ciac.org/ciac/bulletins/p-071.shtml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ciac.org/ciac/bulletins/p-071.shtml" }, { "reference_url": "http://www.debian.org/security/2004/dsa-589", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2004/dsa-589" }, { "reference_url": "http://www.debian.org/security/2004/dsa-591", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2004/dsa-591" }, { "reference_url": "http://www.debian.org/security/2004/dsa-601", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2004/dsa-601" }, { "reference_url": "http://www.debian.org/security/2004/dsa-602", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2004/dsa-602" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:132", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:132" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:113", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:113" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:114", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:114" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:122", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:122" }, { "reference_url": "http://www.osvdb.org/11190", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/11190" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2004-638.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2004-638.html" }, { "reference_url": "http://www.securityfocus.com/bid/11523", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/11523" }, { "reference_url": "http://www.trustix.org/errata/2004/0058", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2004/0058" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617343", "reference_id": "1617343", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617343" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:1.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gd_graphics_library:gdlib:1.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:1.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gd_graphics_library:gdlib:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gd_graphics_library:gdlib:2.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gd_graphics_library:gdlib:2.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gd_graphics_library:gdlib:2.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gd_graphics_library:gdlib:2.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gd_graphics_library:gdlib:2.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gd_graphics_library:gdlib:2.0.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.27:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gd_graphics_library:gdlib:2.0.27:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.27:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gd_graphics_library:gdlib:2.0.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0990", "reference_id": "CVE-2004-0990", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0990" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/600.c", "reference_id": "OSVDB-11190;CVE-2004-0990", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/600.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:638", "reference_id": "RHSA-2004:638", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:638" }, { "reference_url": "https://usn.ubuntu.com/11-1/", "reference_id": "USN-11-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/11-1/" }, { "reference_url": "https://usn.ubuntu.com/21-1/", "reference_id": "USN-21-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/21-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/927389?format=api", "purl": "pkg:deb/debian/libgd2@2.0.30-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.30-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/927387?format=api", "purl": "pkg:deb/debian/libgd2@2.3.0-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/927385?format=api", "purl": "pkg:deb/debian/libgd2@2.3.3-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/927388?format=api", "purl": "pkg:deb/debian/libgd2@2.3.3-13?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0990" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gcg3-b5bm-73dw" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.30-1%3Fdistro=trixie" }