{"url":"http://public2.vulnerablecode.io/api/packages/129764?format=json","purl":"pkg:rpm/redhat/gd@2.0.28-5.4E.el4_6?arch=1","type":"rpm","namespace":"redhat","name":"gd","version":"2.0.28-5.4E.el4_6","qualifiers":{"arch":"1"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88844?format=json","vulnerability_id":"VCID-2bcm-xg5v-kyaw","summary":"gd: GIF handling buffer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4484.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4484.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4484","reference_id":"","reference_type":"","scores":[{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91011","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91015","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91025","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91034","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91046","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91053","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91061","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91085","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91087","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91101","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91099","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91094","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91109","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91123","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91136","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91134","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91143","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384838","reference_id":"384838","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384838"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384841","reference_id":"384841","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384841"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431568","reference_id":"431568","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431568"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0669","reference_id":"RHSA-2006:0669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0688","reference_id":"RHSA-2006:0688","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0688"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"},{"reference_url":"https://usn.ubuntu.com/342-1/","reference_id":"USN-342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/342-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4484"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2bcm-xg5v-kyaw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88770?format=json","vulnerability_id":"VCID-busj-qfth-v7e3","summary":"gd: buffer overrun","references":[{"reference_url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607","reference_id":"","reference_type":"","scores":[],"url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607"},{"reference_url":"http://fedoranews.org/cms/node/2631","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2631"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"},{"reference_url":"http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0155.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0155.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0455.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0455.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0455","reference_id":"","reference_type":"","scores":[{"value":"0.04925","scoring_system":"epss","scoring_elements":"0.89618","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04925","scoring_system":"epss","scoring_elements":"0.89579","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04925","scoring_system":"epss","scoring_elements":"0.89626","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04925","scoring_system":"epss","scoring_elements":"0.89582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04925","scoring_system":"epss","scoring_elements":"0.89596","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04925","scoring_system":"epss","scoring_elements":"0.89613","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90284","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.9028","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90275","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90222","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90217","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90235","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90231","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90245","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90241","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90254","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90269","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455"},{"reference_url":"http://secunia.com/advisories/23916","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23916"},{"reference_url":"http://secunia.com/advisories/24022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24022"},{"reference_url":"http://secunia.com/advisories/24052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24052"},{"reference_url":"http://secunia.com/advisories/24053","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24053"},{"reference_url":"http://secunia.com/advisories/24107","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24107"},{"reference_url":"http://secunia.com/advisories/24143","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24143"},{"reference_url":"http://secunia.com/advisories/24151","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24151"},{"reference_url":"http://secunia.com/advisories/24924","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24924"},{"reference_url":"http://secunia.com/advisories/24945","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24945"},{"reference_url":"http://secunia.com/advisories/24965","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24965"},{"reference_url":"http://secunia.com/advisories/25575","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25575"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/42813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42813"},{"reference_url":"https://issues.rpath.com/browse/RPL-1030","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1030"},{"reference_url":"https://issues.rpath.com/browse/RPL-1268","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1268"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:035","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:036","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:036"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:038","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:038"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:109","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:109"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0153.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0153.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0162.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0162.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/archive/1/466166/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/466166/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22289","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22289"},{"reference_url":"http://www.trustix.org/errata/2007/0007","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0007"},{"reference_url":"http://www.ubuntu.com/usn/usn-473-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-473-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0400","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0400"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0022","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=224607","reference_id":"224607","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=224607"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408982","reference_id":"408982","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408982"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0455","reference_id":"CVE-2007-0455","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0153","reference_id":"RHSA-2007:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0155","reference_id":"RHSA-2007:0155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0162","reference_id":"RHSA-2007:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"},{"reference_url":"https://usn.ubuntu.com/473-1/","reference_id":"USN-473-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/473-1/"}],"fixed_packages":[],"aliases":["CVE-2007-0455"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-busj-qfth-v7e3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41557?format=json","vulnerability_id":"VCID-ek5b-jujn-bqet","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"},{"reference_url":"http://bugs.libgd.org/?do=details&task_id=94","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=94"},{"reference_url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"},{"reference_url":"http://osvdb.org/37744","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/37744"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3473.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3473.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3473","reference_id":"","reference_type":"","scores":[{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93235","published_at":"2026-05-12T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93188","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93196","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93202","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93201","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93197","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93204","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93217","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93227","published_at":"2026-05-09T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93228","published_at":"2026-05-11T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93165","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93183","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12126","scoring_system":"epss","scoring_elements":"0.93768","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12126","scoring_system":"epss","scoring_elements":"0.93802","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12126","scoring_system":"epss","scoring_elements":"0.93807","published_at":"2026-04-11T12:55:00Z"},{"value":"0.12126","scoring_system":"epss","scoring_elements":"0.93778","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12126","scoring_system":"epss","scoring_elements":"0.93787","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12126","scoring_system":"epss","scoring_elements":"0.93791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12126","scoring_system":"epss","scoring_elements":"0.938","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473"},{"reference_url":"http://secunia.com/advisories/25855","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25855"},{"reference_url":"http://secunia.com/advisories/25860","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25860"},{"reference_url":"http://secunia.com/advisories/26272","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26272"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26415"},{"reference_url":"http://secunia.com/advisories/26467","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26467"},{"reference_url":"http://secunia.com/advisories/26663","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26663"},{"reference_url":"http://secunia.com/advisories/26766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26766"},{"reference_url":"http://secunia.com/advisories/26856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26856"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://secunia.com/advisories/42813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42813"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35109","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35109"},{"reference_url":"https://issues.rpath.com/browse/RPL-1643","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1643"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"},{"reference_url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24651","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24651"},{"reference_url":"http://www.trustix.org/errata/2007/0024/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0024/"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2336","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2336"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0022","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=276791","reference_id":"276791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=276791"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3473","reference_id":"CVE-2007-3473","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3473"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30251.c","reference_id":"CVE-2007-3473;OSVDB-37744","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30251.c"},{"reference_url":"https://www.securityfocus.com/bid/24651/info","reference_id":"CVE-2007-3473;OSVDB-37744","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/24651/info"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"}],"fixed_packages":[],"aliases":["CVE-2007-3473"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ek5b-jujn-bqet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41556?format=json","vulnerability_id":"VCID-j15c-u5ty-jug1","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"},{"reference_url":"http://bugs.libgd.org/?do=details&task_id=89","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=89"},{"reference_url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"},{"reference_url":"http://osvdb.org/37745","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/37745"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3472.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3472.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3472","reference_id":"","reference_type":"","scores":[{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90663","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90602","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90599","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90614","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90643","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90656","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90653","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90593","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90587","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90605","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09309","scoring_system":"epss","scoring_elements":"0.9272","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09309","scoring_system":"epss","scoring_elements":"0.92727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09309","scoring_system":"epss","scoring_elements":"0.92733","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09309","scoring_system":"epss","scoring_elements":"0.9273","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11193","scoring_system":"epss","scoring_elements":"0.93487","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11193","scoring_system":"epss","scoring_elements":"0.9349","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11193","scoring_system":"epss","scoring_elements":"0.93496","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3472"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472"},{"reference_url":"http://secunia.com/advisories/25855","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25855"},{"reference_url":"http://secunia.com/advisories/25860","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25860"},{"reference_url":"http://secunia.com/advisories/26272","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26272"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26415"},{"reference_url":"http://secunia.com/advisories/26467","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26467"},{"reference_url":"http://secunia.com/advisories/26663","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26663"},{"reference_url":"http://secunia.com/advisories/26766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26766"},{"reference_url":"http://secunia.com/advisories/26856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26856"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://secunia.com/advisories/42813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42813"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35108","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35108"},{"reference_url":"https://issues.rpath.com/browse/RPL-1643","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1643"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html"},{"reference_url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24651","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24651"},{"reference_url":"http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/","reference_id":"","reference_type":"","scores":[],"url":"http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/"},{"reference_url":"http://www.trustix.org/errata/2007/0024/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0024/"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2336","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2336"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0022","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=276751","reference_id":"276751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=276751"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3472","reference_id":"CVE-2007-3472","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3472"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"}],"fixed_packages":[],"aliases":["CVE-2007-3472"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j15c-u5ty-jug1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41555?format=json","vulnerability_id":"VCID-tttf-2akk-57ez","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"http://bugs.libgd.org/?do=details&task_id=86","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=86"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"},{"reference_url":"http://osvdb.org/35788","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/35788"},{"reference_url":"http://osvdb.org/36643","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36643"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2756","reference_id":"","reference_type":"","scores":[{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91423","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91365","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91368","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91377","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91375","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.9139","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91405","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91415","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91413","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91343","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91341","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91498","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91538","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91505","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91511","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91519","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756"},{"reference_url":"http://secunia.com/advisories/25353","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25353"},{"reference_url":"http://secunia.com/advisories/25362","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25362"},{"reference_url":"http://secunia.com/advisories/25378","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25378"},{"reference_url":"http://secunia.com/advisories/25535","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25535"},{"reference_url":"http://secunia.com/advisories/25575","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25575"},{"reference_url":"http://secunia.com/advisories/25590","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25590"},{"reference_url":"http://secunia.com/advisories/25646","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25646"},{"reference_url":"http://secunia.com/advisories/25657","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25657"},{"reference_url":"http://secunia.com/advisories/25658","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25658"},{"reference_url":"http://secunia.com/advisories/25787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25787"},{"reference_url":"http://secunia.com/advisories/25855","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25855"},{"reference_url":"http://secunia.com/advisories/26048","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26048"},{"reference_url":"http://secunia.com/advisories/26231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26231"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26871","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26871"},{"reference_url":"http://secunia.com/advisories/26895","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26895"},{"reference_url":"http://secunia.com/advisories/26930","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26930"},{"reference_url":"http://secunia.com/advisories/26967","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26967"},{"reference_url":"http://secunia.com/advisories/27037","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27037"},{"reference_url":"http://secunia.com/advisories/27102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27102"},{"reference_url":"http://secunia.com/advisories/27110","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27110"},{"reference_url":"http://secunia.com/advisories/27545","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27545"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34420","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34420"},{"reference_url":"https://issues.rpath.com/browse/RPL-1394","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1394"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:122","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:122"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:123","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:123"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:124","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:124"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html"},{"reference_url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html"},{"reference_url":"http://www.php.net/releases/5_2_3.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/5_2_3.php"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/bid/24089","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24089"},{"reference_url":"http://www.securitytracker.com/id?1018187","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018187"},{"reference_url":"http://www.trustix.org/errata/2007/0019/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0019/"},{"reference_url":"http://www.trustix.org/errata/2007/0023/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0023/"},{"reference_url":"http://www.ubuntu.com/usn/usn-473-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-473-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1904","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1904"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1905","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1905"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2016","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2016"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2336","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2336"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3386","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3386"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=242033","reference_id":"242033","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=242033"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584","reference_id":"425584","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426100","reference_id":"426100","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426100"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2756","reference_id":"CVE-2007-2756","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2756"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"},{"reference_url":"https://usn.ubuntu.com/473-1/","reference_id":"USN-473-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/473-1/"}],"fixed_packages":[],"aliases":["CVE-2007-2756"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tttf-2akk-57ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41562?format=json","vulnerability_id":"VCID-vqee-h72u-hbar","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"},{"reference_url":"http://bugs.libgd.org/?do=details&task_id=87","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=87"},{"reference_url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"},{"reference_url":"http://osvdb.org/37741","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/37741"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3476.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3476.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3476","reference_id":"","reference_type":"","scores":[{"value":"0.05321","scoring_system":"epss","scoring_elements":"0.90001","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05321","scoring_system":"epss","scoring_elements":"0.90003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05321","scoring_system":"epss","scoring_elements":"0.90015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05321","scoring_system":"epss","scoring_elements":"0.90021","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91065","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91071","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.9108","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91107","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91121","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07951","scoring_system":"epss","scoring_elements":"0.92084","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07951","scoring_system":"epss","scoring_elements":"0.92076","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07951","scoring_system":"epss","scoring_elements":"0.92073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07951","scoring_system":"epss","scoring_elements":"0.92112","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07951","scoring_system":"epss","scoring_elements":"0.92096","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07951","scoring_system":"epss","scoring_elements":"0.92105","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3476"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476"},{"reference_url":"http://secunia.com/advisories/25860","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25860"},{"reference_url":"http://secunia.com/advisories/26272","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26272"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26415"},{"reference_url":"http://secunia.com/advisories/26467","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26467"},{"reference_url":"http://secunia.com/advisories/26663","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26663"},{"reference_url":"http://secunia.com/advisories/26766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26766"},{"reference_url":"http://secunia.com/advisories/26856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26856"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://secunia.com/advisories/31168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31168"},{"reference_url":"http://secunia.com/advisories/42813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42813"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://issues.rpath.com/browse/RPL-1643","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1643"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348"},{"reference_url":"http://www.debian.org/security/2008/dsa-1613","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1613"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html"},{"reference_url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24651","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24651"},{"reference_url":"http://www.trustix.org/errata/2007/0024/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0024/"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0022","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277201","reference_id":"277201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277201"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525","reference_id":"601525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3476","reference_id":"CVE-2007-3476","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3476"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"},{"reference_url":"https://usn.ubuntu.com/854-1/","reference_id":"USN-854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/854-1/"}],"fixed_packages":[],"aliases":["CVE-2007-3476"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqee-h72u-hbar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41560?format=json","vulnerability_id":"VCID-yhfa-jcqy-wkdx","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"},{"reference_url":"http://bugs.libgd.org/?do=details&task_id=70","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=70"},{"reference_url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3475.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3475.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3475","reference_id":"","reference_type":"","scores":[{"value":"0.12094","scoring_system":"epss","scoring_elements":"0.93764","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12094","scoring_system":"epss","scoring_elements":"0.93774","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12094","scoring_system":"epss","scoring_elements":"0.93778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12094","scoring_system":"epss","scoring_elements":"0.93755","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.9443","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94445","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94449","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94452","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94453","published_at":"2026-04-24T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.9445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94454","published_at":"2026-05-05T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94461","published_at":"2026-05-07T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94472","published_at":"2026-05-09T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94476","published_at":"2026-05-11T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94483","published_at":"2026-05-12T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94421","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94425","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94428","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3475"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475"},{"reference_url":"http://secunia.com/advisories/25860","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25860"},{"reference_url":"http://secunia.com/advisories/26272","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26272"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26415"},{"reference_url":"http://secunia.com/advisories/26467","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26467"},{"reference_url":"http://secunia.com/advisories/26663","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26663"},{"reference_url":"http://secunia.com/advisories/26766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26766"},{"reference_url":"http://secunia.com/advisories/26856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26856"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://secunia.com/advisories/42813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42813"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://issues.rpath.com/browse/RPL-1643","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1643"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9728","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9728"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html"},{"reference_url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24651","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24651"},{"reference_url":"http://www.trustix.org/errata/2007/0024/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0024/"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0022","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277181","reference_id":"277181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277181"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3475","reference_id":"CVE-2007-3475","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3475"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"},{"reference_url":"https://usn.ubuntu.com/854-1/","reference_id":"USN-854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/854-1/"}],"fixed_packages":[],"aliases":["CVE-2007-3475"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yhfa-jcqy-wkdx"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gd@2.0.28-5.4E.el4_6%3Farch=1"}