Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-6hmc-132t-fkhn
Summary
T1Lib is vulnerable to a buffer overflow allowing for the user-assisted
    execution of arbitrary code.
Aliases
0
alias CVE-2007-4033
Fixed_packages
0
url pkg:ebuild/media-libs/t1lib@5.0.2-r1
purl pkg:ebuild/media-libs/t1lib@5.0.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/t1lib@5.0.2-r1
Affected_packages
0
url pkg:rpm/redhat/tetex@2.0.2-22.0.1.EL4?arch=10
purl pkg:rpm/redhat/tetex@2.0.2-22.0.1.EL4?arch=10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6hmc-132t-fkhn
1
vulnerability VCID-kgk7-hqby-wkez
2
vulnerability VCID-sv3r-4tym-qua5
3
vulnerability VCID-wpgs-8fw5-wbhe
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tetex@2.0.2-22.0.1.EL4%3Farch=10
1
url pkg:rpm/redhat/tetex@3.0-33.2.el5_1?arch=2
purl pkg:rpm/redhat/tetex@3.0-33.2.el5_1?arch=2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6hmc-132t-fkhn
1
vulnerability VCID-kgk7-hqby-wkez
2
vulnerability VCID-sv3r-4tym-qua5
3
vulnerability VCID-wpgs-8fw5-wbhe
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tetex@3.0-33.2.el5_1%3Farch=2
2
url pkg:rpm/redhat/xpdf@1:0.92-19?arch=el2
purl pkg:rpm/redhat/xpdf@1:0.92-19?arch=el2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6hmc-132t-fkhn
1
vulnerability VCID-sv3r-4tym-qua5
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xpdf@1:0.92-19%3Farch=el2
3
url pkg:rpm/redhat/xpdf@1:2.02-11?arch=el3
purl pkg:rpm/redhat/xpdf@1:2.02-11?arch=el3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6hmc-132t-fkhn
1
vulnerability VCID-kgk7-hqby-wkez
2
vulnerability VCID-sv3r-4tym-qua5
3
vulnerability VCID-wpgs-8fw5-wbhe
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xpdf@1:2.02-11%3Farch=el3
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4033.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4033.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4033
reference_id
reference_type
scores
0
value 0.25348
scoring_system epss
scoring_elements 0.96169
published_at 2026-04-01T12:55:00Z
1
value 0.25348
scoring_system epss
scoring_elements 0.96177
published_at 2026-04-02T12:55:00Z
2
value 0.25348
scoring_system epss
scoring_elements 0.96185
published_at 2026-04-04T12:55:00Z
3
value 0.25348
scoring_system epss
scoring_elements 0.96187
published_at 2026-04-07T12:55:00Z
4
value 0.25348
scoring_system epss
scoring_elements 0.96197
published_at 2026-04-08T12:55:00Z
5
value 0.25348
scoring_system epss
scoring_elements 0.962
published_at 2026-04-09T12:55:00Z
6
value 0.25348
scoring_system epss
scoring_elements 0.96205
published_at 2026-04-11T12:55:00Z
7
value 0.25348
scoring_system epss
scoring_elements 0.96204
published_at 2026-04-12T12:55:00Z
8
value 0.25348
scoring_system epss
scoring_elements 0.96206
published_at 2026-04-13T12:55:00Z
9
value 0.25348
scoring_system epss
scoring_elements 0.96214
published_at 2026-04-16T12:55:00Z
10
value 0.25348
scoring_system epss
scoring_elements 0.96219
published_at 2026-04-21T12:55:00Z
11
value 0.25348
scoring_system epss
scoring_elements 0.9622
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4033
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=352271
reference_id 352271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=352271
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/4227.php
reference_id CVE-2007-4033
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/4227.php
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/30401.php
reference_id CVE-2007-4033;OSVDB-38698
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/30401.php
5
reference_url https://www.securityfocus.com/bid/25079/info
reference_id CVE-2007-4033;OSVDB-38698
reference_type exploit
scores
url https://www.securityfocus.com/bid/25079/info
6
reference_url https://security.gentoo.org/glsa/200710-12
reference_id GLSA-200710-12
reference_type
scores
url https://security.gentoo.org/glsa/200710-12
7
reference_url https://access.redhat.com/errata/RHSA-2007:1027
reference_id RHSA-2007:1027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1027
8
reference_url https://access.redhat.com/errata/RHSA-2007:1030
reference_id RHSA-2007:1030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1030
9
reference_url https://access.redhat.com/errata/RHSA-2007:1031
reference_id RHSA-2007:1031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1031
10
reference_url https://usn.ubuntu.com/515-1/
reference_id USN-515-1
reference_type
scores
url https://usn.ubuntu.com/515-1/
Weaknesses
Exploits
0
date_added 2007-07-25
description PHP 5.2.3 - 'PHP_gd2.dll' imagepsloadfont Local Buffer Overflow (PoC)
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2007-07-26
exploit_type dos
platform windows
source_date_updated 2016-12-01
data_source Exploit-DB
source_url
Severity_range_scorenull
Exploitability2.0
Weighted_severity0.2
Risk_score0.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-6hmc-132t-fkhn