{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","type":"deb","namespace":"debian","name":"libgd2","version":"2.3.0-2","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.3.0-2+deb11u1","latest_non_vulnerable_version":"2.3.3-13","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81340?format=json","vulnerability_id":"VCID-1pj7-5gy9-97f7","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10167.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10167.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10167","reference_id":"","reference_type":"","scores":[{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76636","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76639","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76668","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76649","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76681","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76692","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.7672","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76739","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76729","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76761","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76767","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76779","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76768","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418984","reference_id":"1418984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418984"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3221","reference_id":"RHSA-2017:3221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3213-1/","reference_id":"USN-3213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3213-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927400?format=json","purl":"pkg:deb/debian/libgd2@2.2.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-10167"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1pj7-5gy9-97f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59873?format=json","vulnerability_id":"VCID-2659-zhbq-y7bb","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could lead to arbitrary code execution or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7127.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7127.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7127","reference_id":"","reference_type":"","scores":[{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85888","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85925","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85935","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.8595","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85943","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85961","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85965","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85955","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85975","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85984","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.85985","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02726","scoring_system":"epss","scoring_elements":"0.86004","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374701","reference_id":"1374701","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/3095-1/","reference_id":"USN-3095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3095-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927394?format=json","purl":"pkg:deb/debian/libgd2@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-7127"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2659-zhbq-y7bb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89377?format=json","vulnerability_id":"VCID-29sd-8qne-53d1","summary":"gd: additional overflows","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0941.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0941.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0941","reference_id":"","reference_type":"","scores":[{"value":"0.11933","scoring_system":"epss","scoring_elements":"0.93713","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11933","scoring_system":"epss","scoring_elements":"0.93722","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11933","scoring_system":"epss","scoring_elements":"0.93733","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11933","scoring_system":"epss","scoring_elements":"0.93736","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11933","scoring_system":"epss","scoring_elements":"0.93745","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11933","scoring_system":"epss","scoring_elements":"0.93748","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14039","scoring_system":"epss","scoring_elements":"0.94368","published_at":"2026-04-26T12:55:00Z"},{"value":"0.14039","scoring_system":"epss","scoring_elements":"0.94366","published_at":"2026-04-21T12:55:00Z"},{"value":"0.14039","scoring_system":"epss","scoring_elements":"0.94371","published_at":"2026-05-05T12:55:00Z"},{"value":"0.14039","scoring_system":"epss","scoring_elements":"0.94343","published_at":"2026-04-12T12:55:00Z"},{"value":"0.14039","scoring_system":"epss","scoring_elements":"0.94345","published_at":"2026-04-13T12:55:00Z"},{"value":"0.14039","scoring_system":"epss","scoring_elements":"0.9436","published_at":"2026-04-16T12:55:00Z"},{"value":"0.14039","scoring_system":"epss","scoring_elements":"0.94365","published_at":"2026-04-29T12:55:00Z"},{"value":"0.14992","scoring_system":"epss","scoring_elements":"0.94561","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0941"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0941","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0941"},{"reference_url":"http://secunia.com/advisories/13179/","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/13179/"},{"reference_url":"http://secunia.com/advisories/18686","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18686"},{"reference_url":"http://secunia.com/advisories/20824","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/20824"},{"reference_url":"http://secunia.com/advisories/21050","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21050"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18048","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18048"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11176","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11176"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1195","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1195"},{"reference_url":"https://www.ubuntu.com/usn/usn-25-1/","reference_id":"","reference_type":"","scores":[],"url":"https://www.ubuntu.com/usn/usn-25-1/"},{"reference_url":"https://www.ubuntu.com/usn/usn-33-1/","reference_id":"","reference_type":"","scores":[],"url":"https://www.ubuntu.com/usn/usn-33-1/"},{"reference_url":"http://www.ciac.org/ciac/bulletins/p-071.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://www.ciac.org/ciac/bulletins/p-071.shtml"},{"reference_url":"http://www.debian.org/security/2004/dsa-601","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2004/dsa-601"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:113","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:113"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:114","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:114"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:122","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:122"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2004-638.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2004-638.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0194.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0194.html"},{"reference_url":"http://www.securityfocus.com/bid/11663","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/11663"},{"reference_url":"http://www.trustix.org/errata/2004/0058","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2004/0058"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=175413","reference_id":"175413","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=175413"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0941","reference_id":"CVE-2004-0941","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:638","reference_id":"RHSA-2004:638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0194","reference_id":"RHSA-2006:0194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0194"},{"reference_url":"https://usn.ubuntu.com/25-1/","reference_id":"USN-25-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/25-1/"},{"reference_url":"https://usn.ubuntu.com/33-1/","reference_id":"USN-33-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/33-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927386?format=json","purl":"pkg:deb/debian/libgd2@2.0.33-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.33-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2004-0941"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-29sd-8qne-53d1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88844?format=json","vulnerability_id":"VCID-2bcm-xg5v-kyaw","summary":"gd: GIF handling buffer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4484.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4484.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4484","reference_id":"","reference_type":"","scores":[{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91011","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91015","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91025","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91034","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91046","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91053","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91061","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91085","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91087","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91101","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91099","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91094","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91109","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384838","reference_id":"384838","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384838"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384841","reference_id":"384841","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384841"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431568","reference_id":"431568","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431568"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0669","reference_id":"RHSA-2006:0669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0688","reference_id":"RHSA-2006:0688","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0688"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"},{"reference_url":"https://usn.ubuntu.com/342-1/","reference_id":"USN-342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/342-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927391?format=json","purl":"pkg:deb/debian/libgd2@2.0.33-5.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.33-5.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2006-4484"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2bcm-xg5v-kyaw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81583?format=json","vulnerability_id":"VCID-34yj-pb2j-5faa","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5116.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5116.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5116","reference_id":"","reference_type":"","scores":[{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.85109","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.84967","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.84981","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.84998","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.85002","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.85025","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.85032","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.85048","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.85046","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.85043","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.85064","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.85066","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.85088","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.85096","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02396","scoring_system":"epss","scoring_elements":"0.85094","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340856","reference_id":"1340856","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340856"},{"reference_url":"https://usn.ubuntu.com/3030-1/","reference_id":"USN-3030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3030-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927399?format=json","purl":"pkg:deb/debian/libgd2@2.2.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-5116"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-34yj-pb2j-5faa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72442?format=json","vulnerability_id":"VCID-3bce-bp4m-3bcy","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6362.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6362.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6362","reference_id":"","reference_type":"","scores":[{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.614","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61424","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61463","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61467","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61451","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61439","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61453","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61448","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80248","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80259","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80277","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80262","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80204","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80212","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.80232","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01378","scoring_system":"epss","scoring_elements":"0.8022","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/libgd/libgd/issues/381","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/libgd/libgd/issues/381"},{"reference_url":"https://github.com/libgd/libgd/releases/tag/gd-2.2.5","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/libgd/libgd/releases/tag/gd-2.2.5"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2BLXX7KNRE7ZVQAKGTHHWS33CUCXVUP/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2BLXX7KNRE7ZVQAKGTHHWS33CUCXVUP/"},{"reference_url":"http://www.debian.org/security/2017/dsa-3961","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3961"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489842","reference_id":"1489842","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489842"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:libgd:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6362","reference_id":"CVE-2017-6362","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6362"},{"reference_url":"https://usn.ubuntu.com/3410-1/","reference_id":"USN-3410-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3410-1/"},{"reference_url":"https://usn.ubuntu.com/3410-2/","reference_id":"USN-3410-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3410-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927407?format=json","purl":"pkg:deb/debian/libgd2@2.2.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2017-6362"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3bce-bp4m-3bcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61526?format=json","vulnerability_id":"VCID-3v99-kbeq-47d8","summary":"Multiple vulnerabilities have been found in GD, the worst of which\n    could result in the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5711.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5711.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5711","reference_id":"","reference_type":"","scores":[{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91953","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91994","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.92002","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.92006","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.92001","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91961","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91969","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91975","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91988","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91991","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91993","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.9199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.92008","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.92005","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10274","scoring_system":"epss","scoring_elements":"0.93199","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535246","reference_id":"1535246","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535246"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887485","reference_id":"887485","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887485"},{"reference_url":"https://security.archlinux.org/AVG-865","reference_id":"AVG-865","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-865"},{"reference_url":"https://security.gentoo.org/glsa/201903-18","reference_id":"GLSA-201903-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201903-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2519","reference_id":"RHSA-2019:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"reference_url":"https://usn.ubuntu.com/3755-1/","reference_id":"USN-3755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3755-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927409?format=json","purl":"pkg:deb/debian/libgd2@2.2.5-4.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-4.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2018-5711"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3v99-kbeq-47d8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46241?format=json","vulnerability_id":"VCID-45dp-3xz9-qyd3","summary":"A vulnerability in libpng may allow a remote attacker to crash applications\n    that handle untrusted images.","references":[{"reference_url":"http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html","reference_id":"","reference_type":"","scores":[],"url":"http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=307562","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=307562"},{"reference_url":"http://irrlicht.sourceforge.net/changes.txt","reference_id":"","reference_type":"","scores":[],"url":"http://irrlicht.sourceforge.net/changes.txt"},{"reference_url":"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"},{"reference_url":"http://openpkg.com/go/OpenPKG-SA-2007.013","reference_id":"","reference_type":"","scores":[],"url":"http://openpkg.com/go/OpenPKG-SA-2007.013"},{"reference_url":"http://osvdb.org/36196","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36196"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2445.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2445.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2445","reference_id":"","reference_type":"","scores":[{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97249","published_at":"2026-05-05T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.972","published_at":"2026-04-01T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97206","published_at":"2026-04-02T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97212","published_at":"2026-04-04T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97213","published_at":"2026-04-07T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97222","published_at":"2026-04-08T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97223","published_at":"2026-04-09T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97227","published_at":"2026-04-12T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97228","published_at":"2026-04-13T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97239","published_at":"2026-04-18T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97241","published_at":"2026-04-24T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97242","published_at":"2026-04-26T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97243","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2445"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445"},{"reference_url":"http://secunia.com/advisories/25268","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25268"},{"reference_url":"http://secunia.com/advisories/25273","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25273"},{"reference_url":"http://secunia.com/advisories/25292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25292"},{"reference_url":"http://secunia.com/advisories/25329","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25329"},{"reference_url":"http://secunia.com/advisories/25353","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25353"},{"reference_url":"http://secunia.com/advisories/25461","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25461"},{"reference_url":"http://secunia.com/advisories/25554","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25554"},{"reference_url":"http://secunia.com/advisories/25571","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25571"},{"reference_url":"http://secunia.com/advisories/25742","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25742"},{"reference_url":"http://secunia.com/advisories/25787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25787"},{"reference_url":"http://secunia.com/advisories/25867","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25867"},{"reference_url":"http://secunia.com/advisories/27056","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27056"},{"reference_url":"http://secunia.com/advisories/29420","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29420"},{"reference_url":"http://secunia.com/advisories/30161","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30161"},{"reference_url":"http://secunia.com/advisories/31168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31168"},{"reference_url":"http://secunia.com/advisories/34388","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34388"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34340","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34340"},{"reference_url":"https://issues.rpath.com/browse/RPL-1381","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1381"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650"},{"reference_url":"http://sourceforge.net/project/shownotes.php?release_id=508653&group_id=5624","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?release_id=508653&group_id=5624"},{"reference_url":"http://sourceforge.net/project/shownotes.php?release_id=508656&group_id=5624","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?release_id=508656&group_id=5624"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm"},{"reference_url":"http://www.coresecurity.com/?action=item&id=2148","reference_id":"","reference_type":"","scores":[],"url":"http://www.coresecurity.com/?action=item&id=2148"},{"reference_url":"http://www.debian.org/security/2008/dsa-1613","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1613"},{"reference_url":"http://www.debian.org/security/2009/dsa-1750","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1750"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"},{"reference_url":"http://www.kb.cert.org/vuls/id/684664","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/684664"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:116","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:116"},{"reference_url":"http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0356.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0356.html"},{"reference_url":"http://www.securityfocus.com/archive/1/468910/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/468910/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/489135/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/489135/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24000","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24000"},{"reference_url":"http://www.securityfocus.com/bid/24023","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24023"},{"reference_url":"http://www.securitytracker.com/id?1018078","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018078"},{"reference_url":"http://www.trustix.org/errata/2007/0019/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0019/"},{"reference_url":"http://www.ubuntu.com/usn/usn-472-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-472-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1838","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1838"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2385","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2385"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0924/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0924/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=239425","reference_id":"239425","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=239425"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2445","reference_id":"CVE-2007-2445","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2445"},{"reference_url":"https://security.gentoo.org/glsa/200705-24","reference_id":"GLSA-200705-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200705-24"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0356","reference_id":"RHSA-2007:0356","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0356"},{"reference_url":"https://usn.ubuntu.com/472-1/","reference_id":"USN-472-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/472-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927392?format=json","purl":"pkg:deb/debian/libgd2@2.0.35.dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.35.dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2007-2445"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45dp-3xz9-qyd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57179?format=json","vulnerability_id":"VCID-49jr-gtjs-1ba9","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could under certain conditions lead to the remote execution of\n    arbitrary code.","references":[{"reference_url":"http://cvs.php.net/viewvc.cgi/php-src/ext/gd/libgd/wbmp.c?r1=1.2.4.1&r2=1.2.4.1.8.1","reference_id":"","reference_type":"","scores":[],"url":"http://cvs.php.net/viewvc.cgi/php-src/ext/gd/libgd/wbmp.c?r1=1.2.4.1&r2=1.2.4.1.8.1"},{"reference_url":"http://cvs.php.net/viewvc.cgi/php-src/ext/gd/libgd/wbmp.c?revision=1.2.4.1.8.1&view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://cvs.php.net/viewvc.cgi/php-src/ext/gd/libgd/wbmp.c?revision=1.2.4.1.8.1&view=markup"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=306172","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=306172"},{"reference_url":"http://ifsec.blogspot.com/2007/04/php-521-wbmp-file-handling-integer.html","reference_id":"","reference_type":"","scores":[],"url":"http://ifsec.blogspot.com/2007/04/php-521-wbmp-file-handling-integer.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0155.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0155.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1001.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1001.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1001","reference_id":"","reference_type":"","scores":[{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93682","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93606","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93615","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93624","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93626","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93635","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93638","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93661","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93669","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93672","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93677","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93676","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11588","scoring_system":"epss","scoring_elements":"0.93673","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001"},{"reference_url":"http://secunia.com/advisories/24814","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24814"},{"reference_url":"http://secunia.com/advisories/24909","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24909"},{"reference_url":"http://secunia.com/advisories/24924","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24924"},{"reference_url":"http://secunia.com/advisories/24945","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24945"},{"reference_url":"http://secunia.com/advisories/24965","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24965"},{"reference_url":"http://secunia.com/advisories/25056","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25056"},{"reference_url":"http://secunia.com/advisories/25151","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25151"},{"reference_url":"http://secunia.com/advisories/25445","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25445"},{"reference_url":"http://secunia.com/advisories/26235","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26235"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200705-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200705-19.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33453","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33453"},{"reference_url":"https://issues.rpath.com/browse/RPL-1268","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1268"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10179","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10179"},{"reference_url":"http://us2.php.net/releases/4_4_7.php","reference_id":"","reference_type":"","scores":[],"url":"http://us2.php.net/releases/4_4_7.php"},{"reference_url":"http://us2.php.net/releases/5_2_2.php","reference_id":"","reference_type":"","scores":[],"url":"http://us2.php.net/releases/5_2_2.php"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:087","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:087"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:088","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:088"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:089","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:089"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:090","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:090"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_32_php.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_32_php.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0153.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0153.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0162.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0162.html"},{"reference_url":"http://www.securityfocus.com/archive/1/464957/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/464957/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/466166/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/466166/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/23357","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23357"},{"reference_url":"http://www.securityfocus.com/bid/25159","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/25159"},{"reference_url":"http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.470053","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.470053"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1269","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1269"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2732","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2732"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618291","reference_id":"1618291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618291"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1001","reference_id":"CVE-2007-1001","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1001"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/29823.c","reference_id":"CVE-2007-1001;OSVDB-34671","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/29823.c"},{"reference_url":"https://www.securityfocus.com/bid/23357/info","reference_id":"CVE-2007-1001;OSVDB-34671","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/23357/info"},{"reference_url":"https://security.gentoo.org/glsa/200705-19","reference_id":"GLSA-200705-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200705-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0153","reference_id":"RHSA-2007:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0155","reference_id":"RHSA-2007:0155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0162","reference_id":"RHSA-2007:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0162"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927393?format=json","purl":"pkg:deb/debian/libgd2@2.0.33-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.33-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2007-1001"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-49jr-gtjs-1ba9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41480?format=json","vulnerability_id":"VCID-4ehv-84qa-fubx","summary":"The GD library is prone to a buffer overflow vulnerability.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3546","reference_id":"","reference_type":"","scores":[{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88589","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88643","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.8858","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89349","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89352","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89361","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89322","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89319","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89332","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89331","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89327","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89345","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=529213","reference_id":"529213","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=529213"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534","reference_id":"552534","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525","reference_id":"601525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://security.gentoo.org/glsa/201001-03","reference_id":"GLSA-201001-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201001-03"},{"reference_url":"https://security.gentoo.org/glsa/201006-16","reference_id":"GLSA-201006-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201006-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0003","reference_id":"RHSA-2010:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0040","reference_id":"RHSA-2010:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0040"},{"reference_url":"https://usn.ubuntu.com/854-1/","reference_id":"USN-854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/854-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927395?format=json","purl":"pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2009-3546"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ehv-84qa-fubx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81336?format=json","vulnerability_id":"VCID-4eyx-7fmr-r7dm","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6906.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6906.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6906","reference_id":"","reference_type":"","scores":[{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63448","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63535","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63551","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63568","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63584","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63571","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63578","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63562","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63581","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63594","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63588","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63561","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435313","reference_id":"1435313","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435313"},{"reference_url":"https://usn.ubuntu.com/3213-1/","reference_id":"USN-3213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3213-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927400?format=json","purl":"pkg:deb/debian/libgd2@2.2.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-6906"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4eyx-7fmr-r7dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59591?format=json","vulnerability_id":"VCID-5xgj-hjsk-r3h5","summary":"Multiple vulnerabilities have been discovered in PHP, the worst of\n    which could lead to remote execution of arbitrary code.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00024.html"},{"reference_url":"http://php.net/ChangeLog-5.php","reference_id":"","reference_type":"","scores":[],"url":"http://php.net/ChangeLog-5.php"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1327.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1327.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1765.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1765.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1766.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1766.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5120.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5120.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5120","reference_id":"","reference_type":"","scores":[{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92313","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92254","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92261","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92266","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92269","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92281","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92285","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.9229","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92292","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92289","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92301","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92306","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92307","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92303","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5120"},{"reference_url":"https://bugs.php.net/bug.php?id=67730","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.php.net/bug.php?id=67730"},{"reference_url":"https://support.apple.com/HT204659","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT204659"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1132793","reference_id":"1132793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1132793"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.0:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.0:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.0:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.0:beta2:32-bit:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.0:beta2:32-bit:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.0:beta2:32-bit:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.12:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.12:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.12:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.12:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.12:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.12:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.13:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.13:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.13:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.14:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.14:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.14:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.15:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.15:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.15:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.16:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.16:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.16:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5120","reference_id":"CVE-2014-5120","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5120"},{"reference_url":"https://security.gentoo.org/glsa/201408-11","reference_id":"GLSA-201408-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1327","reference_id":"RHSA-2014:1327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1765","reference_id":"RHSA-2014:1765","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1766","reference_id":"RHSA-2014:1766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1766"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927394?format=json","purl":"pkg:deb/debian/libgd2@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2014-5120"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5xgj-hjsk-r3h5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61527?format=json","vulnerability_id":"VCID-6xda-97rd-9bam","summary":"Multiple vulnerabilities have been found in GD, the worst of which\n    could result in the remote execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html"},{"reference_url":"http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html"},{"reference_url":"http://php.net/ChangeLog-5.php","reference_id":"","reference_type":"","scores":[],"url":"http://php.net/ChangeLog-5.php"},{"reference_url":"http://php.net/ChangeLog-7.php","reference_id":"","reference_type":"","scores":[],"url":"http://php.net/ChangeLog-7.php"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6977.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6977.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6977","reference_id":"","reference_type":"","scores":[{"value":"0.863","scoring_system":"epss","scoring_elements":"0.99399","published_at":"2026-04-02T12:55:00Z"},{"value":"0.863","scoring_system":"epss","scoring_elements":"0.9941","published_at":"2026-04-26T12:55:00Z"},{"value":"0.863","scoring_system":"epss","scoring_elements":"0.99405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.863","scoring_system":"epss","scoring_elements":"0.99408","published_at":"2026-05-05T12:55:00Z"},{"value":"0.863","scoring_system":"epss","scoring_elements":"0.99407","published_at":"2026-04-18T12:55:00Z"},{"value":"0.863","scoring_system":"epss","scoring_elements":"0.99409","published_at":"2026-04-29T12:55:00Z"},{"value":"0.863","scoring_system":"epss","scoring_elements":"0.994","published_at":"2026-04-04T12:55:00Z"},{"value":"0.863","scoring_system":"epss","scoring_elements":"0.99402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.863","scoring_system":"epss","scoring_elements":"0.99403","published_at":"2026-04-09T12:55:00Z"},{"value":"0.863","scoring_system":"epss","scoring_elements":"0.99404","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6977"},{"reference_url":"https://bugs.php.net/bug.php?id=77270","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.php.net/bug.php?id=77270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190315-0003/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190315-0003/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4384","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4384"},{"reference_url":"https://www.exploit-db.com/exploits/46677/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/46677/"},{"reference_url":"http://www.securityfocus.com/bid/106731","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106731"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1672207","reference_id":"1672207","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1672207"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920645","reference_id":"920645","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920645"},{"reference_url":"https://security.archlinux.org/AVG-865","reference_id":"AVG-865","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-865"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storage_automation_store:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:7.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://github.com/cfreal/exploits/blob/1a671d1d8510e93a0b2607261e9b779562585fe2/CVE-2019-6977-imagecolormatch/exploit.php","reference_id":"CVE-2019-6977","reference_type":"exploit","scores":[],"url":"https://github.com/cfreal/exploits/blob/1a671d1d8510e93a0b2607261e9b779562585fe2/CVE-2019-6977-imagecolormatch/exploit.php"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/46677.php","reference_id":"CVE-2019-6977","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/46677.php"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6977","reference_id":"CVE-2019-6977","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6977"},{"reference_url":"https://security.gentoo.org/glsa/201903-18","reference_id":"GLSA-201903-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201903-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2519","reference_id":"RHSA-2019:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3299","reference_id":"RHSA-2019:3299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4659","reference_id":"RHSA-2020:4659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4659"},{"reference_url":"https://usn.ubuntu.com/3900-1/","reference_id":"USN-3900-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3900-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927411?format=json","purl":"pkg:deb/debian/libgd2@2.2.5-5.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2019-6977"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xda-97rd-9bam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72904?format=json","vulnerability_id":"VCID-6ysv-9bmx-w7df","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7890.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7890.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7890","reference_id":"","reference_type":"","scores":[{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.96165","published_at":"2026-04-01T12:55:00Z"},{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.96201","published_at":"2026-04-11T12:55:00Z"},{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.96173","published_at":"2026-04-02T12:55:00Z"},{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.96181","published_at":"2026-04-04T12:55:00Z"},{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.96183","published_at":"2026-04-07T12:55:00Z"},{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.96193","published_at":"2026-04-08T12:55:00Z"},{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.96196","published_at":"2026-04-09T12:55:00Z"},{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.962","published_at":"2026-04-12T12:55:00Z"},{"value":"0.28056","scoring_system":"epss","scoring_elements":"0.96487","published_at":"2026-04-21T12:55:00Z"},{"value":"0.28056","scoring_system":"epss","scoring_elements":"0.96486","published_at":"2026-04-18T12:55:00Z"},{"value":"0.28056","scoring_system":"epss","scoring_elements":"0.96475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.28056","scoring_system":"epss","scoring_elements":"0.96482","published_at":"2026-04-16T12:55:00Z"},{"value":"0.30217","scoring_system":"epss","scoring_elements":"0.96696","published_at":"2026-04-29T12:55:00Z"},{"value":"0.30217","scoring_system":"epss","scoring_elements":"0.96704","published_at":"2026-05-05T12:55:00Z"},{"value":"0.30217","scoring_system":"epss","scoring_elements":"0.96692","published_at":"2026-04-24T12:55:00Z"},{"value":"0.30217","scoring_system":"epss","scoring_elements":"0.96695","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473822","reference_id":"1473822","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473822"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869263","reference_id":"869263","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0406","reference_id":"RHSA-2018:0406","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0406"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3389-1/","reference_id":"USN-3389-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3389-1/"},{"reference_url":"https://usn.ubuntu.com/3389-2/","reference_id":"USN-3389-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3389-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927407?format=json","purl":"pkg:deb/debian/libgd2@2.2.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2017-7890"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ysv-9bmx-w7df"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82203?format=json","vulnerability_id":"VCID-75xx-y3xu-cqe2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6911.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6911.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6911","reference_id":"","reference_type":"","scores":[{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70523","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70655","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70679","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70678","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70537","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70532","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70577","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70615","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.706","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70587","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70631","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.7064","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70618","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.7067","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388787","reference_id":"1388787","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388787"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840806","reference_id":"840806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840806"},{"reference_url":"https://security.archlinux.org/ASA-201611-19","reference_id":"ASA-201611-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-19"},{"reference_url":"https://security.archlinux.org/AVG-58","reference_id":"AVG-58","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-58"},{"reference_url":"https://usn.ubuntu.com/3117-1/","reference_id":"USN-3117-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3117-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927405?format=json","purl":"pkg:deb/debian/libgd2@2.2.3-87-gd0fec80-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.3-87-gd0fec80-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-6911"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-75xx-y3xu-cqe2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41563?format=json","vulnerability_id":"VCID-7d1e-wnq6-4qfr","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"},{"reference_url":"http://bugs.libgd.org/?do=details&task_id=74","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=74"},{"reference_url":"http://bugs.libgd.org/?do=details&task_id=92","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=92"},{"reference_url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"},{"reference_url":"http://osvdb.org/42062","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/42062"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3477.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3477.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3477","reference_id":"","reference_type":"","scores":[{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.9162","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.91601","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.91599","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.91621","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.91616","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.91624","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.91622","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.91632","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07483","scoring_system":"epss","scoring_elements":"0.91789","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07483","scoring_system":"epss","scoring_elements":"0.91753","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07483","scoring_system":"epss","scoring_elements":"0.91759","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07483","scoring_system":"epss","scoring_elements":"0.91766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07483","scoring_system":"epss","scoring_elements":"0.91779","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07483","scoring_system":"epss","scoring_elements":"0.91786","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07483","scoring_system":"epss","scoring_elements":"0.91745","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3477"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477"},{"reference_url":"http://secunia.com/advisories/25860","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25860"},{"reference_url":"http://secunia.com/advisories/26272","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26272"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26415"},{"reference_url":"http://secunia.com/advisories/26467","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26467"},{"reference_url":"http://secunia.com/advisories/26663","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26663"},{"reference_url":"http://secunia.com/advisories/26766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26766"},{"reference_url":"http://secunia.com/advisories/26856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26856"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://secunia.com/advisories/31168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31168"},{"reference_url":"http://secunia.com/advisories/42813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42813"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://issues.rpath.com/browse/RPL-1643","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1643"},{"reference_url":"http://www.debian.org/security/2008/dsa-1613","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1613"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html"},{"reference_url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"},{"reference_url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24651","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24651"},{"reference_url":"http://www.trustix.org/errata/2007/0024/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0024/"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0022","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277221","reference_id":"277221","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277221"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525","reference_id":"601525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3477","reference_id":"CVE-2007-3477","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3477"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://usn.ubuntu.com/854-1/","reference_id":"USN-854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/854-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927392?format=json","purl":"pkg:deb/debian/libgd2@2.0.35.dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.35.dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2007-3477"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7d1e-wnq6-4qfr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81585?format=json","vulnerability_id":"VCID-7rvx-8x2z-7kdm","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6214.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6214.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6214","reference_id":"","reference_type":"","scores":[{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91672","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.9168","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91686","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91694","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91707","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91714","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91719","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91715","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91736","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.9173","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91735","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91732","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91744","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356466","reference_id":"1356466","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356466"},{"reference_url":"https://usn.ubuntu.com/3060-1/","reference_id":"USN-3060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927402?format=json","purl":"pkg:deb/debian/libgd2@2.2.2-29-g3c2b605-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.2-29-g3c2b605-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-6214"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7rvx-8x2z-7kdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47343?format=json","vulnerability_id":"VCID-9wvm-w1qk-xycw","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could lead to arbitrary code execution, or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9709.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9709.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9709","reference_id":"","reference_type":"","scores":[{"value":"0.16543","scoring_system":"epss","scoring_elements":"0.94874","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16543","scoring_system":"epss","scoring_elements":"0.94883","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16543","scoring_system":"epss","scoring_elements":"0.94886","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16543","scoring_system":"epss","scoring_elements":"0.94888","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16543","scoring_system":"epss","scoring_elements":"0.94897","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16543","scoring_system":"epss","scoring_elements":"0.94901","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16543","scoring_system":"epss","scoring_elements":"0.94906","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16543","scoring_system":"epss","scoring_elements":"0.94908","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16543","scoring_system":"epss","scoring_elements":"0.9491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16543","scoring_system":"epss","scoring_elements":"0.94917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16543","scoring_system":"epss","scoring_elements":"0.94921","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16543","scoring_system":"epss","scoring_elements":"0.94925","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16543","scoring_system":"epss","scoring_elements":"0.94926","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16543","scoring_system":"epss","scoring_elements":"0.94932","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1188639","reference_id":"1188639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1188639"},{"reference_url":"https://security.gentoo.org/glsa/201606-10","reference_id":"GLSA-201606-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201606-10"},{"reference_url":"https://security.gentoo.org/glsa/201607-04","reference_id":"GLSA-201607-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1053","reference_id":"RHSA-2015:1053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1066","reference_id":"RHSA-2015:1066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1135","reference_id":"RHSA-2015:1135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1218","reference_id":"RHSA-2015:1218","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1218"},{"reference_url":"https://usn.ubuntu.com/2987-1/","reference_id":"USN-2987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2987-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927398?format=json","purl":"pkg:deb/debian/libgd2@2.1.0-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2014-9709"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9wvm-w1qk-xycw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56174?format=json","vulnerability_id":"VCID-9zks-j1fv-ukew","summary":"Multiple vulnerabilities have been found in GD, the worst of which\n    allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183263.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183263.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183724.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183724.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html"},{"reference_url":"http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3074.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3074.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3074","reference_id":"","reference_type":"","scores":[{"value":"0.54408","scoring_system":"epss","scoring_elements":"0.98035","published_at":"2026-04-29T12:55:00Z"},{"value":"0.54408","scoring_system":"epss","scoring_elements":"0.98031","published_at":"2026-04-26T12:55:00Z"},{"value":"0.54408","scoring_system":"epss","scoring_elements":"0.98043","published_at":"2026-05-05T12:55:00Z"},{"value":"0.54698","scoring_system":"epss","scoring_elements":"0.98027","published_at":"2026-04-07T12:55:00Z"},{"value":"0.54698","scoring_system":"epss","scoring_elements":"0.98032","published_at":"2026-04-08T12:55:00Z"},{"value":"0.54698","scoring_system":"epss","scoring_elements":"0.98019","published_at":"2026-04-01T12:55:00Z"},{"value":"0.54698","scoring_system":"epss","scoring_elements":"0.98037","published_at":"2026-04-12T12:55:00Z"},{"value":"0.54698","scoring_system":"epss","scoring_elements":"0.98038","published_at":"2026-04-13T12:55:00Z"},{"value":"0.54698","scoring_system":"epss","scoring_elements":"0.98044","published_at":"2026-04-18T12:55:00Z"},{"value":"0.54698","scoring_system":"epss","scoring_elements":"0.98042","published_at":"2026-04-21T12:55:00Z"},{"value":"0.54698","scoring_system":"epss","scoring_elements":"0.9804","published_at":"2026-04-24T12:55:00Z"},{"value":"0.54698","scoring_system":"epss","scoring_elements":"0.98033","published_at":"2026-04-09T12:55:00Z"},{"value":"0.54698","scoring_system":"epss","scoring_elements":"0.98024","published_at":"2026-04-02T12:55:00Z"},{"value":"0.54698","scoring_system":"epss","scoring_elements":"0.98026","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Apr/72","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Apr/72"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/libgd/libgd/commit/2bb97f407c1145c850416a3bfbcc8cf124e68a19","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/libgd/libgd/commit/2bb97f407c1145c850416a3bfbcc8cf124e68a19"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://security.gentoo.org/glsa/201611-22","reference_id":"","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201611-22"},{"reference_url":"https://www.exploit-db.com/exploits/39736/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/39736/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3556","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3556"},{"reference_url":"http://www.debian.org/security/2016/dsa-3602","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3602"},{"reference_url":"http://www.securityfocus.com/archive/1/538160/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/538160/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/87087","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/87087"},{"reference_url":"http://www.securitytracker.com/id/1035659","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035659"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.383127","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.383127"},{"reference_url":"http://www.ubuntu.com/usn/USN-2987-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2987-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1321893","reference_id":"1321893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1321893"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822242","reference_id":"822242","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822242"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/39736.txt","reference_id":"CVE-2016-3074","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/39736.txt"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3074","reference_id":"CVE-2016-3074","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3074"},{"reference_url":"https://security.gentoo.org/glsa/201607-04","reference_id":"GLSA-201607-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2987-1/","reference_id":"USN-2987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2987-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927401?format=json","purl":"pkg:deb/debian/libgd2@2.1.1-4.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.1-4.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-3074"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9zks-j1fv-ukew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81341?format=json","vulnerability_id":"VCID-b878-mmfs-e3g1","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10168.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10168.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10168","reference_id":"","reference_type":"","scores":[{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70878","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70892","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.7091","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70885","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70929","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70944","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70967","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70951","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70935","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70988","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71021","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71031","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71029","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71012","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418986","reference_id":"1418986","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418986"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3221","reference_id":"RHSA-2017:3221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3213-1/","reference_id":"USN-3213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3213-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927400?format=json","purl":"pkg:deb/debian/libgd2@2.2.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-10168"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b878-mmfs-e3g1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88770?format=json","vulnerability_id":"VCID-busj-qfth-v7e3","summary":"gd: buffer overrun","references":[{"reference_url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607","reference_id":"","reference_type":"","scores":[],"url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607"},{"reference_url":"http://fedoranews.org/cms/node/2631","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2631"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"},{"reference_url":"http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0155.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0155.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0455.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0455.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0455","reference_id":"","reference_type":"","scores":[{"value":"0.04925","scoring_system":"epss","scoring_elements":"0.89618","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04925","scoring_system":"epss","scoring_elements":"0.89579","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04925","scoring_system":"epss","scoring_elements":"0.89626","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04925","scoring_system":"epss","scoring_elements":"0.89582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04925","scoring_system":"epss","scoring_elements":"0.89596","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04925","scoring_system":"epss","scoring_elements":"0.89613","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90254","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90245","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90241","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90222","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90217","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90235","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05488","scoring_system":"epss","scoring_elements":"0.90231","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455"},{"reference_url":"http://secunia.com/advisories/23916","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23916"},{"reference_url":"http://secunia.com/advisories/24022","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24022"},{"reference_url":"http://secunia.com/advisories/24052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24052"},{"reference_url":"http://secunia.com/advisories/24053","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24053"},{"reference_url":"http://secunia.com/advisories/24107","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24107"},{"reference_url":"http://secunia.com/advisories/24143","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24143"},{"reference_url":"http://secunia.com/advisories/24151","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24151"},{"reference_url":"http://secunia.com/advisories/24924","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24924"},{"reference_url":"http://secunia.com/advisories/24945","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24945"},{"reference_url":"http://secunia.com/advisories/24965","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24965"},{"reference_url":"http://secunia.com/advisories/25575","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25575"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/42813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42813"},{"reference_url":"https://issues.rpath.com/browse/RPL-1030","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1030"},{"reference_url":"https://issues.rpath.com/browse/RPL-1268","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1268"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:035","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:036","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:036"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:038","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:038"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:109","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:109"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0153.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0153.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0162.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0162.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/archive/1/466166/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/466166/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22289","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22289"},{"reference_url":"http://www.trustix.org/errata/2007/0007","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0007"},{"reference_url":"http://www.ubuntu.com/usn/usn-473-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-473-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0400","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0400"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0022","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=224607","reference_id":"224607","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=224607"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408982","reference_id":"408982","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408982"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0455","reference_id":"CVE-2007-0455","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0153","reference_id":"RHSA-2007:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0155","reference_id":"RHSA-2007:0155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0162","reference_id":"RHSA-2007:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"},{"reference_url":"https://usn.ubuntu.com/473-1/","reference_id":"USN-473-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/473-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927392?format=json","purl":"pkg:deb/debian/libgd2@2.0.35.dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.35.dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2007-0455"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-busj-qfth-v7e3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81337?format=json","vulnerability_id":"VCID-cr4d-8dhn-gkgq","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6912.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6912.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6912","reference_id":"","reference_type":"","scores":[{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75343","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75379","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75358","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75401","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75411","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75431","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75409","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75398","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.7544","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75445","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75434","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75469","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75486","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1417977","reference_id":"1417977","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1417977"},{"reference_url":"https://usn.ubuntu.com/3213-1/","reference_id":"USN-3213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3213-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927400?format=json","purl":"pkg:deb/debian/libgd2@2.2.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-6912"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cr4d-8dhn-gkgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59872?format=json","vulnerability_id":"VCID-cyns-e5xv-4fgp","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could lead to arbitrary code execution or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7126.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7126.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7126","reference_id":"","reference_type":"","scores":[{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.89235","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.89241","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.89255","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.89258","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.89275","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.8928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.89289","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.89285","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.89282","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.89295","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.89294","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.89306","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.89311","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.89314","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04632","scoring_system":"epss","scoring_elements":"0.89323","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374699","reference_id":"1374699","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927394?format=json","purl":"pkg:deb/debian/libgd2@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-7126"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cyns-e5xv-4fgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41557?format=json","vulnerability_id":"VCID-ek5b-jujn-bqet","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"},{"reference_url":"http://bugs.libgd.org/?do=details&task_id=94","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=94"},{"reference_url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"},{"reference_url":"http://osvdb.org/37744","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/37744"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3473.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3473.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3473","reference_id":"","reference_type":"","scores":[{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93204","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93165","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93183","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93188","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93196","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93202","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93201","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10285","scoring_system":"epss","scoring_elements":"0.93197","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12126","scoring_system":"epss","scoring_elements":"0.93807","published_at":"2026-04-11T12:55:00Z"},{"value":"0.12126","scoring_system":"epss","scoring_elements":"0.93802","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12126","scoring_system":"epss","scoring_elements":"0.93768","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12126","scoring_system":"epss","scoring_elements":"0.93778","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12126","scoring_system":"epss","scoring_elements":"0.93787","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12126","scoring_system":"epss","scoring_elements":"0.93791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12126","scoring_system":"epss","scoring_elements":"0.938","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473"},{"reference_url":"http://secunia.com/advisories/25855","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25855"},{"reference_url":"http://secunia.com/advisories/25860","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25860"},{"reference_url":"http://secunia.com/advisories/26272","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26272"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26415"},{"reference_url":"http://secunia.com/advisories/26467","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26467"},{"reference_url":"http://secunia.com/advisories/26663","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26663"},{"reference_url":"http://secunia.com/advisories/26766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26766"},{"reference_url":"http://secunia.com/advisories/26856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26856"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://secunia.com/advisories/42813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42813"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35109","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35109"},{"reference_url":"https://issues.rpath.com/browse/RPL-1643","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1643"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"},{"reference_url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24651","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24651"},{"reference_url":"http://www.trustix.org/errata/2007/0024/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0024/"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2336","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2336"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0022","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=276791","reference_id":"276791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=276791"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3473","reference_id":"CVE-2007-3473","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3473"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30251.c","reference_id":"CVE-2007-3473;OSVDB-37744","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30251.c"},{"reference_url":"https://www.securityfocus.com/bid/24651/info","reference_id":"CVE-2007-3473;OSVDB-37744","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/24651/info"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927392?format=json","purl":"pkg:deb/debian/libgd2@2.0.35.dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.35.dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2007-3473"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ek5b-jujn-bqet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62347?format=json","vulnerability_id":"VCID-fcm8-f9e6-83b4","summary":"Multiple vulnerabilities have been found in GD, the worst of which\n    allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6207.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6207","reference_id":"","reference_type":"","scores":[{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.92453","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.9246","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.92468","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.92472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.92483","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.92488","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.92494","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.92496","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.92505","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.92504","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.92508","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.92509","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.9251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.92506","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08719","scoring_system":"epss","scoring_elements":"0.92516","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359800","reference_id":"1359800","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359800"},{"reference_url":"https://security.gentoo.org/glsa/201612-09","reference_id":"GLSA-201612-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/3060-1/","reference_id":"USN-3060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927404?format=json","purl":"pkg:deb/debian/libgd2@2.2.2-43-g22cba39-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.2-43-g22cba39-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-6207"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fcm8-f9e6-83b4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82259?format=json","vulnerability_id":"VCID-fwyg-v128-k7c9","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9933.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9933.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9933","reference_id":"","reference_type":"","scores":[{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93424","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93497","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.9349","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93493","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93432","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.9344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93441","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93452","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93458","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93478","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93484","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1404723","reference_id":"1404723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1404723"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849038","reference_id":"849038","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849038"},{"reference_url":"https://security.archlinux.org/ASA-201611-19","reference_id":"ASA-201611-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-19"},{"reference_url":"https://security.archlinux.org/AVG-58","reference_id":"AVG-58","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-58"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3213-1/","reference_id":"USN-3213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3213-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927402?format=json","purl":"pkg:deb/debian/libgd2@2.2.2-29-g3c2b605-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.2-29-g3c2b605-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-9933"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fwyg-v128-k7c9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81339?format=json","vulnerability_id":"VCID-g1b8-dkd3-j3a2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10166.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10166","reference_id":"","reference_type":"","scores":[{"value":"0.08333","scoring_system":"epss","scoring_elements":"0.9225","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08333","scoring_system":"epss","scoring_elements":"0.92257","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08333","scoring_system":"epss","scoring_elements":"0.92263","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08333","scoring_system":"epss","scoring_elements":"0.92266","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08333","scoring_system":"epss","scoring_elements":"0.92277","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08333","scoring_system":"epss","scoring_elements":"0.92281","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08333","scoring_system":"epss","scoring_elements":"0.92287","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08333","scoring_system":"epss","scoring_elements":"0.92288","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08333","scoring_system":"epss","scoring_elements":"0.92285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08333","scoring_system":"epss","scoring_elements":"0.92297","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08333","scoring_system":"epss","scoring_elements":"0.92302","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08333","scoring_system":"epss","scoring_elements":"0.92303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08333","scoring_system":"epss","scoring_elements":"0.92299","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08333","scoring_system":"epss","scoring_elements":"0.92309","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418983","reference_id":"1418983","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2519","reference_id":"RHSA-2019:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3299","reference_id":"RHSA-2019:3299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3299"},{"reference_url":"https://usn.ubuntu.com/3213-1/","reference_id":"USN-3213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3213-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927400?format=json","purl":"pkg:deb/debian/libgd2@2.2.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-10166"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g1b8-dkd3-j3a2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94855?format=json","vulnerability_id":"VCID-g3zj-r8ag-a7ej","summary":"read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-38115","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38655","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39006","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39192","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39215","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39134","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39188","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39204","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39216","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39179","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3916","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39214","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39184","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39095","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38885","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38862","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3878","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-38115"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991912","reference_id":"991912","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991912"},{"reference_url":"https://security.archlinux.org/AVG-2258","reference_id":"AVG-2258","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2258"},{"reference_url":"https://usn.ubuntu.com/5068-1/","reference_id":"USN-5068-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5068-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927413?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927412?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2021-38115"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g3zj-r8ag-a7ej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89385?format=json","vulnerability_id":"VCID-gcg3-b5bm-73dw","summary":"security flaw","references":[{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=109882489302099&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=109882489302099&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0990.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0990.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0990","reference_id":"","reference_type":"","scores":[{"value":"0.20603","scoring_system":"epss","scoring_elements":"0.95544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20603","scoring_system":"epss","scoring_elements":"0.95553","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20603","scoring_system":"epss","scoring_elements":"0.95558","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20603","scoring_system":"epss","scoring_elements":"0.95561","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20603","scoring_system":"epss","scoring_elements":"0.95568","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20603","scoring_system":"epss","scoring_elements":"0.95571","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20603","scoring_system":"epss","scoring_elements":"0.95575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.21209","scoring_system":"epss","scoring_elements":"0.95683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21209","scoring_system":"epss","scoring_elements":"0.95699","published_at":"2026-05-05T12:55:00Z"},{"value":"0.21209","scoring_system":"epss","scoring_elements":"0.95665","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21209","scoring_system":"epss","scoring_elements":"0.95668","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21209","scoring_system":"epss","scoring_elements":"0.95676","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21209","scoring_system":"epss","scoring_elements":"0.9568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21209","scoring_system":"epss","scoring_elements":"0.95682","published_at":"2026-04-21T12:55:00Z"},{"value":"0.21209","scoring_system":"epss","scoring_elements":"0.95684","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0990"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0990","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0990"},{"reference_url":"http://secunia.com/advisories/18717","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18717"},{"reference_url":"http://secunia.com/advisories/20824","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/20824"},{"reference_url":"http://secunia.com/advisories/20866","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/20866"},{"reference_url":"http://secunia.com/advisories/21050","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21050"},{"reference_url":"http://secunia.com/advisories/23783","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23783"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17866","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17866"},{"reference_url":"https://issues.rpath.com/browse/RPL-939","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-939"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1260","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1260"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9952","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9952"},{"reference_url":"https://www.ubuntu.com/usn/usn-11-1/","reference_id":"","reference_type":"","scores":[],"url":"https://www.ubuntu.com/usn/usn-11-1/"},{"reference_url":"https://www.ubuntu.com/usn/usn-25-1/","reference_id":"","reference_type":"","scores":[],"url":"https://www.ubuntu.com/usn/usn-25-1/"},{"reference_url":"http://www.ciac.org/ciac/bulletins/p-071.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://www.ciac.org/ciac/bulletins/p-071.shtml"},{"reference_url":"http://www.debian.org/security/2004/dsa-589","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2004/dsa-589"},{"reference_url":"http://www.debian.org/security/2004/dsa-591","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2004/dsa-591"},{"reference_url":"http://www.debian.org/security/2004/dsa-601","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2004/dsa-601"},{"reference_url":"http://www.debian.org/security/2004/dsa-602","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2004/dsa-602"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:132","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:132"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:113","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:113"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:114","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:114"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:122","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:122"},{"reference_url":"http://www.osvdb.org/11190","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/11190"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2004-638.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2004-638.html"},{"reference_url":"http://www.securityfocus.com/bid/11523","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/11523"},{"reference_url":"http://www.trustix.org/errata/2004/0058","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2004/0058"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617343","reference_id":"1617343","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617343"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:2.0.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:2.0.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0990","reference_id":"CVE-2004-0990","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0990"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/600.c","reference_id":"OSVDB-11190;CVE-2004-0990","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/600.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:638","reference_id":"RHSA-2004:638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:638"},{"reference_url":"https://usn.ubuntu.com/11-1/","reference_id":"USN-11-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/11-1/"},{"reference_url":"https://usn.ubuntu.com/21-1/","reference_id":"USN-21-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/21-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927389?format=json","purl":"pkg:deb/debian/libgd2@2.0.30-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.30-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2004-0990"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gcg3-b5bm-73dw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62345?format=json","vulnerability_id":"VCID-habv-tr8c-rucd","summary":"Multiple vulnerabilities have been found in GD, the worst of which\n    allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6128.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6128.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6128","reference_id":"","reference_type":"","scores":[{"value":"0.12098","scoring_system":"epss","scoring_elements":"0.93758","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12098","scoring_system":"epss","scoring_elements":"0.93767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12098","scoring_system":"epss","scoring_elements":"0.93777","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12098","scoring_system":"epss","scoring_elements":"0.9378","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12098","scoring_system":"epss","scoring_elements":"0.93789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12098","scoring_system":"epss","scoring_elements":"0.93791","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12098","scoring_system":"epss","scoring_elements":"0.93796","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12098","scoring_system":"epss","scoring_elements":"0.93818","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12098","scoring_system":"epss","scoring_elements":"0.93823","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12098","scoring_system":"epss","scoring_elements":"0.93826","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12098","scoring_system":"epss","scoring_elements":"0.93829","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12098","scoring_system":"epss","scoring_elements":"0.93827","published_at":"2026-04-26T12:55:00Z"},{"value":"0.12098","scoring_system":"epss","scoring_elements":"0.93825","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12098","scoring_system":"epss","scoring_elements":"0.93833","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351603","reference_id":"1351603","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351603"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829062","reference_id":"829062","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829062"},{"reference_url":"https://security.gentoo.org/glsa/201612-09","reference_id":"GLSA-201612-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/3030-1/","reference_id":"USN-3030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3030-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927402?format=json","purl":"pkg:deb/debian/libgd2@2.2.2-29-g3c2b605-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.2-29-g3c2b605-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-6128"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-habv-tr8c-rucd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90363?format=json","vulnerability_id":"VCID-he5a-srth-rydf","summary":"The LZW decoding in the gdImageCreateFromGifPtr function in the Thomas Boutell graphics draw (GD) library (aka libgd) 2.0.33 allows remote attackers to cause a denial of service (CPU consumption) via malformed GIF data that causes an infinite loop.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2906.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2906.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2906","reference_id":"","reference_type":"","scores":[{"value":"0.15275","scoring_system":"epss","scoring_elements":"0.94581","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15275","scoring_system":"epss","scoring_elements":"0.94588","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15275","scoring_system":"epss","scoring_elements":"0.94595","published_at":"2026-04-04T12:55:00Z"},{"value":"0.15275","scoring_system":"epss","scoring_elements":"0.94598","published_at":"2026-04-07T12:55:00Z"},{"value":"0.15275","scoring_system":"epss","scoring_elements":"0.94608","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15275","scoring_system":"epss","scoring_elements":"0.94612","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15275","scoring_system":"epss","scoring_elements":"0.94616","published_at":"2026-04-11T12:55:00Z"},{"value":"0.15275","scoring_system":"epss","scoring_elements":"0.94619","published_at":"2026-04-13T12:55:00Z"},{"value":"0.15275","scoring_system":"epss","scoring_elements":"0.94632","published_at":"2026-04-16T12:55:00Z"},{"value":"0.15275","scoring_system":"epss","scoring_elements":"0.94635","published_at":"2026-04-18T12:55:00Z"},{"value":"0.15275","scoring_system":"epss","scoring_elements":"0.94641","published_at":"2026-04-24T12:55:00Z"},{"value":"0.15275","scoring_system":"epss","scoring_elements":"0.94642","published_at":"2026-04-29T12:55:00Z"},{"value":"0.15275","scoring_system":"epss","scoring_elements":"0.94651","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=372912","reference_id":"372912","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=372912"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/27981.c","reference_id":"CVE-2006-2906;OSVDB-26260","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/27981.c"},{"reference_url":"https://www.securityfocus.com/bid/18294/info","reference_id":"CVE-2006-2906;OSVDB-26260","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/18294/info"},{"reference_url":"https://usn.ubuntu.com/298-1/","reference_id":"USN-298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927390?format=json","purl":"pkg:deb/debian/libgd2@2.0.33-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.33-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2006-2906"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-he5a-srth-rydf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62346?format=json","vulnerability_id":"VCID-hwys-fv79-b7d8","summary":"Multiple vulnerabilities have been found in GD, the worst of which\n    allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6132.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6132.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6132","reference_id":"","reference_type":"","scores":[{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.84085","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.84098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.84116","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.84117","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.8414","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.84146","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.84164","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.84158","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.84153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.84176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.84177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.84182","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.84207","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.84214","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.8422","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02125","scoring_system":"epss","scoring_elements":"0.84239","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1352544","reference_id":"1352544","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1352544"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829694","reference_id":"829694","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829694"},{"reference_url":"https://security.gentoo.org/glsa/201612-09","reference_id":"GLSA-201612-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-09"},{"reference_url":"https://usn.ubuntu.com/3060-1/","reference_id":"USN-3060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927402?format=json","purl":"pkg:deb/debian/libgd2@2.2.2-29-g3c2b605-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.2-29-g3c2b605-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-6132"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hwys-fv79-b7d8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41556?format=json","vulnerability_id":"VCID-j15c-u5ty-jug1","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"},{"reference_url":"http://bugs.libgd.org/?do=details&task_id=89","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=89"},{"reference_url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"},{"reference_url":"http://osvdb.org/37745","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/37745"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3472.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3472.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3472","reference_id":"","reference_type":"","scores":[{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90593","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90587","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90605","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90602","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90599","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90614","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05891","scoring_system":"epss","scoring_elements":"0.90611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09309","scoring_system":"epss","scoring_elements":"0.9272","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09309","scoring_system":"epss","scoring_elements":"0.92727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09309","scoring_system":"epss","scoring_elements":"0.92733","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09309","scoring_system":"epss","scoring_elements":"0.9273","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11193","scoring_system":"epss","scoring_elements":"0.9349","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11193","scoring_system":"epss","scoring_elements":"0.93496","published_at":"2026-04-11T12:55:00Z"},{"value":"0.11193","scoring_system":"epss","scoring_elements":"0.93487","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3472"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472"},{"reference_url":"http://secunia.com/advisories/25855","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25855"},{"reference_url":"http://secunia.com/advisories/25860","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25860"},{"reference_url":"http://secunia.com/advisories/26272","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26272"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26415"},{"reference_url":"http://secunia.com/advisories/26467","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26467"},{"reference_url":"http://secunia.com/advisories/26663","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26663"},{"reference_url":"http://secunia.com/advisories/26766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26766"},{"reference_url":"http://secunia.com/advisories/26856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26856"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://secunia.com/advisories/42813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42813"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35108","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35108"},{"reference_url":"https://issues.rpath.com/browse/RPL-1643","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1643"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html"},{"reference_url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24651","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24651"},{"reference_url":"http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/","reference_id":"","reference_type":"","scores":[],"url":"http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/"},{"reference_url":"http://www.trustix.org/errata/2007/0024/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0024/"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2336","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2336"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0022","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=276751","reference_id":"276751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=276751"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3472","reference_id":"CVE-2007-3472","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3472"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927392?format=json","purl":"pkg:deb/debian/libgd2@2.0.35.dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.35.dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2007-3472"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j15c-u5ty-jug1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56173?format=json","vulnerability_id":"VCID-j52b-eq6b-dqae","summary":"Multiple vulnerabilities have been found in GD, the worst of which\n    allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2497.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2497.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2497","reference_id":"","reference_type":"","scores":[{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.93778","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.93787","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.93797","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.93801","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.93809","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.93812","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.93817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.9384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.93845","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.93847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.9385","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.93848","published_at":"2026-04-26T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.93846","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.93854","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1076676","reference_id":"1076676","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1076676"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744719","reference_id":"744719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744719"},{"reference_url":"https://security.gentoo.org/glsa/201408-11","reference_id":"GLSA-201408-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-11"},{"reference_url":"https://security.gentoo.org/glsa/201607-04","reference_id":"GLSA-201607-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1326","reference_id":"RHSA-2014:1326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1327","reference_id":"RHSA-2014:1327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1765","reference_id":"RHSA-2014:1765","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1766","reference_id":"RHSA-2014:1766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1766"},{"reference_url":"https://usn.ubuntu.com/2987-1/","reference_id":"USN-2987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2987-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927397?format=json","purl":"pkg:deb/debian/libgd2@2.1.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2014-2497"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j52b-eq6b-dqae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80313?format=json","vulnerability_id":"VCID-jhzv-9ey6-gkdz","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00027.html"},{"reference_url":"http://php.net/ChangeLog-5.php","reference_id":"","reference_type":"","scores":[],"url":"http://php.net/ChangeLog-5.php"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8874.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8874.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8874","reference_id":"","reference_type":"","scores":[{"value":"0.03775","scoring_system":"epss","scoring_elements":"0.87995","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03775","scoring_system":"epss","scoring_elements":"0.8806","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03775","scoring_system":"epss","scoring_elements":"0.88053","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03775","scoring_system":"epss","scoring_elements":"0.88054","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03775","scoring_system":"epss","scoring_elements":"0.88067","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03775","scoring_system":"epss","scoring_elements":"0.88065","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03775","scoring_system":"epss","scoring_elements":"0.88083","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03775","scoring_system":"epss","scoring_elements":"0.88005","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03775","scoring_system":"epss","scoring_elements":"0.88019","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03775","scoring_system":"epss","scoring_elements":"0.88024","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03775","scoring_system":"epss","scoring_elements":"0.88044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03775","scoring_system":"epss","scoring_elements":"0.8805","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04079","scoring_system":"epss","scoring_elements":"0.88584","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04079","scoring_system":"epss","scoring_elements":"0.88597","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04079","scoring_system":"epss","scoring_elements":"0.88586","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8874"},{"reference_url":"https://bugs.php.net/bug.php?id=66387","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.php.net/bug.php?id=66387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"http://www.debian.org/security/2016/dsa-3587","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3587"},{"reference_url":"http://www.ubuntu.com/usn/USN-2987-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2987-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1336772","reference_id":"1336772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1336772"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824627","reference_id":"824627","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824627"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8874","reference_id":"CVE-2015-8874","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2987-1/","reference_id":"USN-2987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2987-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927399?format=json","purl":"pkg:deb/debian/libgd2@2.2.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2015-8874"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jhzv-9ey6-gkdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93245?format=json","vulnerability_id":"VCID-jun7-q9ts-ebfe","summary":"In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says \"In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for development and testing purposes.'","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6363","reference_id":"","reference_type":"","scores":[{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62107","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62123","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62116","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62062","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62222","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.6224","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.6223","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62096","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62262","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62246","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62209","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62156","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62187","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62155","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6363"},{"reference_url":"https://usn.ubuntu.com/5068-1/","reference_id":"USN-5068-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5068-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927408?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2017-6363"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jun7-q9ts-ebfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80312?format=json","vulnerability_id":"VCID-k6qv-tnq5-ybd7","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7456.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7456.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7456","reference_id":"","reference_type":"","scores":[{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79885","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79891","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79912","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.799","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79929","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79938","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79957","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79962","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79964","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.79998","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.80015","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01328","scoring_system":"epss","scoring_elements":"0.80027","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340433","reference_id":"1340433","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/3030-1/","reference_id":"USN-3030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3030-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927396?format=json","purl":"pkg:deb/debian/libgd2@2.1.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.1.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2013-7456"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k6qv-tnq5-ybd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80314?format=json","vulnerability_id":"VCID-ku2g-q6cg-ayhc","summary":"security update","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8877.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8877.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8877","reference_id":"","reference_type":"","scores":[{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.8486","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.84843","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.84714","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.84729","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.84748","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.84751","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.84773","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.84779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.84797","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.84793","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.84788","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.84809","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.8481","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.84808","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.84834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02317","scoring_system":"epss","scoring_elements":"0.84844","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8877"},{"reference_url":"https://bugs.php.net/bug.php?id=70064","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.php.net/bug.php?id=70064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877"},{"reference_url":"https://github.com/libgd/libgd/commit/4751b606fa38edc456d627140898a7ec679fcc24","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/libgd/libgd/commit/4751b606fa38edc456d627140898a7ec679fcc24"},{"reference_url":"https://github.com/libgd/libgd/issues/173","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/libgd/libgd/issues/173"},{"reference_url":"http://www.debian.org/security/2016/dsa-3587","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3587"},{"reference_url":"http://www.php.net/ChangeLog-5.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/ChangeLog-5.php"},{"reference_url":"http://www.ubuntu.com/usn/USN-2987-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2987-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1338907","reference_id":"1338907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1338907"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8877","reference_id":"CVE-2015-8877","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/2987-1/","reference_id":"USN-2987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2987-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927399?format=json","purl":"pkg:deb/debian/libgd2@2.2.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2015-8877"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ku2g-q6cg-ayhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81584?format=json","vulnerability_id":"VCID-m3ve-pf4u-9qhh","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6161.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6161.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6161","reference_id":"","reference_type":"","scores":[{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75659","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75693","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75673","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75707","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75718","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75742","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75723","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75755","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75758","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75744","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75783","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75788","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75801","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75809","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1353550","reference_id":"1353550","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1353550"},{"reference_url":"https://usn.ubuntu.com/3030-1/","reference_id":"USN-3030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3030-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927399?format=json","purl":"pkg:deb/debian/libgd2@2.2.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-6161"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m3ve-pf4u-9qhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85048?format=json","vulnerability_id":"VCID-n7w7-16vs-z3gg","summary":"gd: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5767.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5767.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5767","reference_id":"","reference_type":"","scores":[{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89223","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89229","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89244","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89246","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89264","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89269","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89278","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89274","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.8927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89284","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89283","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89296","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89301","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89304","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89313","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351069","reference_id":"1351069","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2598","reference_id":"RHSA-2016:2598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927403?format=json","purl":"pkg:deb/debian/libgd2@2.0.34~rc1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.34~rc1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-5767"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7w7-16vs-z3gg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62348?format=json","vulnerability_id":"VCID-pnee-e13t-57a2","summary":"Multiple vulnerabilities have been found in GD, the worst of which\n    allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7568.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7568.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7568","reference_id":"","reference_type":"","scores":[{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.87398","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.87502","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.87483","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.87489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.87408","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.87422","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.87423","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.87442","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.87449","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.8746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.87456","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.87452","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.87466","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.87469","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03421","scoring_system":"epss","scoring_elements":"0.87467","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1380450","reference_id":"1380450","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1380450"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839659","reference_id":"839659","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839659"},{"reference_url":"https://security.archlinux.org/ASA-201611-19","reference_id":"ASA-201611-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-19"},{"reference_url":"https://security.archlinux.org/AVG-58","reference_id":"AVG-58","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-58"},{"reference_url":"https://security.gentoo.org/glsa/201612-09","reference_id":"GLSA-201612-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-09"},{"reference_url":"https://usn.ubuntu.com/3117-1/","reference_id":"USN-3117-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3117-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927406?format=json","purl":"pkg:deb/debian/libgd2@2.2.3-87-gd0fec80-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.3-87-gd0fec80-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-7568"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pnee-e13t-57a2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94885?format=json","vulnerability_id":"VCID-qqe4-4aja-j7dz","summary":"gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka LibGD) through 2.3.2 has a double free. NOTE: the vendor's position is \"The GD2 image format is a proprietary image format of libgd. It has to be regarded as being obsolete, and should only be used for development and testing purposes.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-40145","reference_id":"","reference_type":"","scores":[{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62284","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62333","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62317","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62342","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62337","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62226","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62276","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62293","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62312","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62302","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62326","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00537","scoring_system":"epss","scoring_elements":"0.67494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00537","scoring_system":"epss","scoring_elements":"0.67515","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00537","scoring_system":"epss","scoring_elements":"0.67458","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-40145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145"},{"reference_url":"https://security.archlinux.org/AVG-2258","reference_id":"AVG-2258","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2258"},{"reference_url":"https://usn.ubuntu.com/5068-1/","reference_id":"USN-5068-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5068-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927413?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927412?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2021-40145"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qqe4-4aja-j7dz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61525?format=json","vulnerability_id":"VCID-r7yv-ryzk-z3e8","summary":"Multiple vulnerabilities have been found in GD, the worst of which\n    could result in the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000222.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000222.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000222","reference_id":"","reference_type":"","scores":[{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75721","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75675","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.7566","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75699","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75704","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75716","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75623","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75633","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.7564","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75671","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.78981","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79007","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.78975","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000222"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1621953","reference_id":"1621953","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1621953"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906886","reference_id":"906886","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906886"},{"reference_url":"https://security.archlinux.org/AVG-865","reference_id":"AVG-865","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-865"},{"reference_url":"https://security.gentoo.org/glsa/201903-18","reference_id":"GLSA-201903-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201903-18"},{"reference_url":"https://usn.ubuntu.com/3755-1/","reference_id":"USN-3755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3755-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927409?format=json","purl":"pkg:deb/debian/libgd2@2.2.5-4.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-4.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2018-1000222"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7yv-ryzk-z3e8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81586?format=json","vulnerability_id":"VCID-s33d-rhg8-wqej","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6905.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6905.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6905","reference_id":"","reference_type":"","scores":[{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80427","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80434","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80455","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80444","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80474","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80484","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80502","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80487","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.8048","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80509","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.8051","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80538","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80541","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80559","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80579","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6905"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356485","reference_id":"1356485","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356485"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927402?format=json","purl":"pkg:deb/debian/libgd2@2.2.2-29-g3c2b605-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.2-29-g3c2b605-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-6905"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s33d-rhg8-wqej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94909?format=json","vulnerability_id":"VCID-s83u-wk4f-wkfd","summary":"The GD Graphics Library (aka LibGD) through 2.3.2 has an out-of-bounds read because of the lack of certain gdGetBuf and gdPutBuf return value checks.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-40812","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32401","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32903","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32944","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32922","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32885","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32738","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32623","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32541","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32895","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.33025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.33058","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32888","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32964","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32967","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32929","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-40812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9","reference_id":"6f5136821be86e7068fcdf651ae9420b5d42e9a9","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T16:15:07Z/"}],"url":"https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9"},{"reference_url":"https://github.com/libgd/libgd/issues/750#issuecomment-914872385","reference_id":"750#issuecomment-914872385","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T16:15:07Z/"}],"url":"https://github.com/libgd/libgd/issues/750#issuecomment-914872385"},{"reference_url":"https://security.archlinux.org/AVG-2258","reference_id":"AVG-2258","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2258"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T16:15:07Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00003.html"},{"reference_url":"https://usn.ubuntu.com/7112-1/","reference_id":"USN-7112-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7112-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927413?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927412?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2021-40812"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s83u-wk4f-wkfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61311?format=json","vulnerability_id":"VCID-saq8-dj13-bfcy","summary":"Multiple vulnerabilities were found in PHP, the worst of which leading to\n    the remote execution of arbitrary code.","references":[{"reference_url":"http://cvs.php.net/viewvc.cgi/php-src/NEWS?r1=1.2027.2.547.2.1360&r2=1.2027.2.547.2.1361&diff_format=u","reference_id":"","reference_type":"","scores":[],"url":"http://cvs.php.net/viewvc.cgi/php-src/NEWS?r1=1.2027.2.547.2.1360&r2=1.2027.2.547.2.1361&diff_format=u"},{"reference_url":"http://downloads.securityfocus.com/vulnerabilities/exploits/33002-2.php","reference_id":"","reference_type":"","scores":[],"url":"http://downloads.securityfocus.com/vulnerabilities/exploits/33002-2.php"},{"reference_url":"http://downloads.securityfocus.com/vulnerabilities/exploits/33002.php","reference_id":"","reference_type":"","scores":[],"url":"http://downloads.securityfocus.com/vulnerabilities/exploits/33002.php"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=124654546101607&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=124654546101607&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=125631037611762&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=125631037611762&w=2"},{"reference_url":"http://osvdb.org/51031","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/51031"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5498.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5498.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5498","reference_id":"","reference_type":"","scores":[{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93197","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93141","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93145","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93144","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93152","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93157","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93162","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93161","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93177","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93182","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.9319","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93195","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10269","scoring_system":"epss","scoring_elements":"0.93191","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5498"},{"reference_url":"http://secunia.com/advisories/34642","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34642"},{"reference_url":"http://secunia.com/advisories/35306","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35306"},{"reference_url":"http://secunia.com/advisories/35650","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35650"},{"reference_url":"http://secunia.com/advisories/36701","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/36701"},{"reference_url":"http://securitytracker.com/id?1021494","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1021494"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47635","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47635"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9667","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9667"},{"reference_url":"http://support.apple.com/kb/HT3865","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3865"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:021","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:021"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:022","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:022"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:023","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:023"},{"reference_url":"http://www.php.net/releases/5_2_9.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/5_2_9.php"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0350.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0350.html"},{"reference_url":"http://www.securityfocus.com/bid/33002","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/33002"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=478425","reference_id":"478425","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=478425"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5498","reference_id":"CVE-2008-5498","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5498"},{"reference_url":"https://security.gentoo.org/glsa/201001-03","reference_id":"GLSA-201001-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201001-03"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/7646.txt","reference_id":"OSVDB-51031;CVE-2008-5498","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/7646.txt"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0337","reference_id":"RHSA-2009:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0337"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0338","reference_id":"RHSA-2009:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0338"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927394?format=json","purl":"pkg:deb/debian/libgd2@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2008-5498"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-saq8-dj13-bfcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79067?format=json","vulnerability_id":"VCID-sszm-mvm2-m7ee","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11038.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11038.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11038","reference_id":"","reference_type":"","scores":[{"value":"0.1054","scoring_system":"epss","scoring_elements":"0.93297","published_at":"2026-05-05T12:55:00Z"},{"value":"0.1054","scoring_system":"epss","scoring_elements":"0.93299","published_at":"2026-04-24T12:55:00Z"},{"value":"0.1054","scoring_system":"epss","scoring_elements":"0.93295","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1054","scoring_system":"epss","scoring_elements":"0.93291","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1054","scoring_system":"epss","scoring_elements":"0.93249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1054","scoring_system":"epss","scoring_elements":"0.93248","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1054","scoring_system":"epss","scoring_elements":"0.93256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1054","scoring_system":"epss","scoring_elements":"0.93261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1054","scoring_system":"epss","scoring_elements":"0.93265","published_at":"2026-04-11T12:55:00Z"},{"value":"0.1054","scoring_system":"epss","scoring_elements":"0.93262","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1054","scoring_system":"epss","scoring_elements":"0.93264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1054","scoring_system":"epss","scoring_elements":"0.93282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1054","scoring_system":"epss","scoring_elements":"0.93287","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1054","scoring_system":"epss","scoring_elements":"0.93293","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10719","scoring_system":"epss","scoring_elements":"0.93303","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10719","scoring_system":"epss","scoring_elements":"0.93295","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1724149","reference_id":"1724149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1724149"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929821","reference_id":"929821","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2519","reference_id":"RHSA-2019:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3299","reference_id":"RHSA-2019:3299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3299"},{"reference_url":"https://usn.ubuntu.com/4316-1/","reference_id":"USN-4316-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4316-1/"},{"reference_url":"https://usn.ubuntu.com/4316-2/","reference_id":"USN-4316-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4316-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927410?format=json","purl":"pkg:deb/debian/libgd2@2.2.5-5.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2019-11038"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sszm-mvm2-m7ee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42237?format=json","vulnerability_id":"VCID-svg5-jd8s-mbb5","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3996","reference_id":"","reference_type":"","scores":[{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92838","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92849","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92847","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92874","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92875","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.9288","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13543","scoring_system":"epss","scoring_elements":"0.94249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94613","published_at":"2026-04-29T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94621","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3996"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278031","reference_id":"278031","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278031"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456","reference_id":"443456","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525","reference_id":"601525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0888","reference_id":"RHSA-2007:0888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://usn.ubuntu.com/557-1/","reference_id":"USN-557-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/557-1/"},{"reference_url":"https://usn.ubuntu.com/720-1/","reference_id":"USN-720-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/720-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927392?format=json","purl":"pkg:deb/debian/libgd2@2.0.35.dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.35.dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2007-3996"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-svg5-jd8s-mbb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41564?format=json","vulnerability_id":"VCID-szfb-zfrk-4qha","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"http://bugs.libgd.org/?do=details&task_id=48","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=48"},{"reference_url":"http://bugs.php.net/bug.php?id=40578","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.php.net/bug.php?id=40578"},{"reference_url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"},{"reference_url":"http://osvdb.org/37740","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/37740"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3478.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3478.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3478","reference_id":"","reference_type":"","scores":[{"value":"0.12107","scoring_system":"epss","scoring_elements":"0.93771","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12107","scoring_system":"epss","scoring_elements":"0.9378","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12107","scoring_system":"epss","scoring_elements":"0.93783","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12107","scoring_system":"epss","scoring_elements":"0.93761","published_at":"2026-04-01T12:55:00Z"},{"value":"0.14445","scoring_system":"epss","scoring_elements":"0.94433","published_at":"2026-04-13T12:55:00Z"},{"value":"0.14445","scoring_system":"epss","scoring_elements":"0.94448","published_at":"2026-04-16T12:55:00Z"},{"value":"0.14445","scoring_system":"epss","scoring_elements":"0.94452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.14445","scoring_system":"epss","scoring_elements":"0.94455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.14445","scoring_system":"epss","scoring_elements":"0.94457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.14445","scoring_system":"epss","scoring_elements":"0.94453","published_at":"2026-04-29T12:55:00Z"},{"value":"0.14445","scoring_system":"epss","scoring_elements":"0.94458","published_at":"2026-05-05T12:55:00Z"},{"value":"0.14445","scoring_system":"epss","scoring_elements":"0.94425","published_at":"2026-04-08T12:55:00Z"},{"value":"0.14445","scoring_system":"epss","scoring_elements":"0.94428","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14445","scoring_system":"epss","scoring_elements":"0.94431","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3478"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3478"},{"reference_url":"http://secunia.com/advisories/25855","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25855"},{"reference_url":"http://secunia.com/advisories/26272","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26272"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26415"},{"reference_url":"http://secunia.com/advisories/26467","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26467"},{"reference_url":"http://secunia.com/advisories/26663","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26663"},{"reference_url":"http://secunia.com/advisories/26766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26766"},{"reference_url":"http://secunia.com/advisories/26856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26856"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://secunia.com/advisories/42813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42813"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://issues.rpath.com/browse/RPL-1643","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1643"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html"},{"reference_url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"},{"reference_url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded"},{"reference_url":"http://www.trustix.org/errata/2007/0024/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0024/"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2336","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2336"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0022","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277231","reference_id":"277231","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277231"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3478","reference_id":"CVE-2007-3478","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3478"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927392?format=json","purl":"pkg:deb/debian/libgd2@2.0.35.dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.35.dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2007-3478"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-szfb-zfrk-4qha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62344?format=json","vulnerability_id":"VCID-tfaf-hb2s-fyb9","summary":"Multiple vulnerabilities have been found in GD, the worst of which\n    allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5766.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5766.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5766","reference_id":"","reference_type":"","scores":[{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94782","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94792","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94795","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94797","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94806","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.9481","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94814","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94818","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94819","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94831","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94835","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94844","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351068","reference_id":"1351068","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351068"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829014","reference_id":"829014","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829014"},{"reference_url":"https://security.gentoo.org/glsa/201612-09","reference_id":"GLSA-201612-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2598","reference_id":"RHSA-2016:2598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5443","reference_id":"RHSA-2020:5443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5443"},{"reference_url":"https://usn.ubuntu.com/3030-1/","reference_id":"USN-3030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3030-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927402?format=json","purl":"pkg:deb/debian/libgd2@2.2.2-29-g3c2b605-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.2-29-g3c2b605-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-5766"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tfaf-hb2s-fyb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41555?format=json","vulnerability_id":"VCID-tttf-2akk-57ez","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"http://bugs.libgd.org/?do=details&task_id=86","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=86"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"},{"reference_url":"http://osvdb.org/35788","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/35788"},{"reference_url":"http://osvdb.org/36643","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36643"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2756","reference_id":"","reference_type":"","scores":[{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.9139","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91343","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91341","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91365","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91368","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91377","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91375","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91538","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91498","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91505","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91511","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91519","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756"},{"reference_url":"http://secunia.com/advisories/25353","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25353"},{"reference_url":"http://secunia.com/advisories/25362","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25362"},{"reference_url":"http://secunia.com/advisories/25378","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25378"},{"reference_url":"http://secunia.com/advisories/25535","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25535"},{"reference_url":"http://secunia.com/advisories/25575","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25575"},{"reference_url":"http://secunia.com/advisories/25590","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25590"},{"reference_url":"http://secunia.com/advisories/25646","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25646"},{"reference_url":"http://secunia.com/advisories/25657","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25657"},{"reference_url":"http://secunia.com/advisories/25658","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25658"},{"reference_url":"http://secunia.com/advisories/25787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25787"},{"reference_url":"http://secunia.com/advisories/25855","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25855"},{"reference_url":"http://secunia.com/advisories/26048","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26048"},{"reference_url":"http://secunia.com/advisories/26231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26231"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26871","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26871"},{"reference_url":"http://secunia.com/advisories/26895","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26895"},{"reference_url":"http://secunia.com/advisories/26930","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26930"},{"reference_url":"http://secunia.com/advisories/26967","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26967"},{"reference_url":"http://secunia.com/advisories/27037","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27037"},{"reference_url":"http://secunia.com/advisories/27102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27102"},{"reference_url":"http://secunia.com/advisories/27110","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27110"},{"reference_url":"http://secunia.com/advisories/27545","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27545"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34420","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34420"},{"reference_url":"https://issues.rpath.com/browse/RPL-1394","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1394"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:122","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:122"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:123","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:123"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:124","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:124"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html"},{"reference_url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html"},{"reference_url":"http://www.php.net/releases/5_2_3.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/5_2_3.php"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/bid/24089","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24089"},{"reference_url":"http://www.securitytracker.com/id?1018187","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018187"},{"reference_url":"http://www.trustix.org/errata/2007/0019/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0019/"},{"reference_url":"http://www.trustix.org/errata/2007/0023/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0023/"},{"reference_url":"http://www.ubuntu.com/usn/usn-473-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-473-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1904","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1904"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1905","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1905"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2016","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2016"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2336","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2336"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3386","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3386"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=242033","reference_id":"242033","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=242033"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584","reference_id":"425584","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426100","reference_id":"426100","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426100"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2756","reference_id":"CVE-2007-2756","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2756"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"},{"reference_url":"https://usn.ubuntu.com/473-1/","reference_id":"USN-473-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/473-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927392?format=json","purl":"pkg:deb/debian/libgd2@2.0.35.dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.35.dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2007-2756"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tttf-2akk-57ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41562?format=json","vulnerability_id":"VCID-vqee-h72u-hbar","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"},{"reference_url":"http://bugs.libgd.org/?do=details&task_id=87","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=87"},{"reference_url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"},{"reference_url":"http://osvdb.org/37741","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/37741"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3476.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3476.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3476","reference_id":"","reference_type":"","scores":[{"value":"0.05321","scoring_system":"epss","scoring_elements":"0.90021","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05321","scoring_system":"epss","scoring_elements":"0.90001","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05321","scoring_system":"epss","scoring_elements":"0.90003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05321","scoring_system":"epss","scoring_elements":"0.90015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.9108","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91065","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91071","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91107","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91121","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07951","scoring_system":"epss","scoring_elements":"0.92084","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07951","scoring_system":"epss","scoring_elements":"0.92076","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07951","scoring_system":"epss","scoring_elements":"0.92073","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3476"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476"},{"reference_url":"http://secunia.com/advisories/25860","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25860"},{"reference_url":"http://secunia.com/advisories/26272","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26272"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26415"},{"reference_url":"http://secunia.com/advisories/26467","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26467"},{"reference_url":"http://secunia.com/advisories/26663","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26663"},{"reference_url":"http://secunia.com/advisories/26766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26766"},{"reference_url":"http://secunia.com/advisories/26856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26856"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://secunia.com/advisories/31168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31168"},{"reference_url":"http://secunia.com/advisories/42813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42813"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://issues.rpath.com/browse/RPL-1643","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1643"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348"},{"reference_url":"http://www.debian.org/security/2008/dsa-1613","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1613"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html"},{"reference_url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24651","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24651"},{"reference_url":"http://www.trustix.org/errata/2007/0024/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0024/"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0022","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277201","reference_id":"277201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277201"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525","reference_id":"601525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3476","reference_id":"CVE-2007-3476","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3476"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"},{"reference_url":"https://usn.ubuntu.com/854-1/","reference_id":"USN-854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/854-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927392?format=json","purl":"pkg:deb/debian/libgd2@2.0.35.dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.35.dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2007-3476"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqee-h72u-hbar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82204?format=json","vulnerability_id":"VCID-vya2-pzx7-m7c1","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8670.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8670.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8670","reference_id":"","reference_type":"","scores":[{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.8199","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82147","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82127","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.8213","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82002","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82024","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.8202","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82047","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82054","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82074","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82064","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82056","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82091","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82093","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82115","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1391068","reference_id":"1391068","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1391068"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840805","reference_id":"840805","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840805"},{"reference_url":"https://security.archlinux.org/ASA-201611-19","reference_id":"ASA-201611-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-19"},{"reference_url":"https://security.archlinux.org/AVG-58","reference_id":"AVG-58","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-58"},{"reference_url":"https://usn.ubuntu.com/3117-1/","reference_id":"USN-3117-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3117-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927406?format=json","purl":"pkg:deb/debian/libgd2@2.2.3-87-gd0fec80-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.3-87-gd0fec80-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-8670"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vya2-pzx7-m7c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81338?format=json","vulnerability_id":"VCID-x14b-aaj3-nyed","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9317.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9317.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9317","reference_id":"","reference_type":"","scores":[{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77859","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77866","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77894","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77904","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77908","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77935","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77919","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77957","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77955","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77982","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77989","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.78002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.78012","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1417987","reference_id":"1417987","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1417987"},{"reference_url":"https://usn.ubuntu.com/3213-1/","reference_id":"USN-3213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3213-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927400?format=json","purl":"pkg:deb/debian/libgd2@2.2.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2016-9317"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x14b-aaj3-nyed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61528?format=json","vulnerability_id":"VCID-x635-b1cj-m7d7","summary":"Multiple vulnerabilities have been found in GD, the worst of which\n    could result in the remote execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6978.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6978.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6978","reference_id":"","reference_type":"","scores":[{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.8545","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85512","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85463","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.8548","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85483","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85503","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85526","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85525","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.85545","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02564","scoring_system":"epss","scoring_elements":"0.8555","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03442","scoring_system":"epss","scoring_elements":"0.87504","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03442","scoring_system":"epss","scoring_elements":"0.8752","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03442","scoring_system":"epss","scoring_elements":"0.87527","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03442","scoring_system":"epss","scoring_elements":"0.87526","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03442","scoring_system":"epss","scoring_elements":"0.87539","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/libgd/libgd/commit/553702980ae89c83f2d6e254d62cf82e204956d0","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/libgd/libgd/commit/553702980ae89c83f2d6e254d62cf82e204956d0"},{"reference_url":"https://github.com/libgd/libgd/issues/492","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/libgd/libgd/issues/492"},{"reference_url":"https://github.com/php/php-src/commit/089f7c0bc28d399b0420aa6ef058e4c1c120b2ae","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/php/php-src/commit/089f7c0bc28d399b0420aa6ef058e4c1c120b2ae"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4384","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4384"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1671390","reference_id":"1671390","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1671390"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920728","reference_id":"920728","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920728"},{"reference_url":"https://security.archlinux.org/AVG-865","reference_id":"AVG-865","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-865"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6978","reference_id":"CVE-2019-6978","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6978"},{"reference_url":"https://security.gentoo.org/glsa/201903-18","reference_id":"GLSA-201903-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201903-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2722","reference_id":"RHSA-2019:2722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3943","reference_id":"RHSA-2020:3943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4659","reference_id":"RHSA-2020:4659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4659"},{"reference_url":"https://usn.ubuntu.com/3900-1/","reference_id":"USN-3900-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3900-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927411?format=json","purl":"pkg:deb/debian/libgd2@2.2.5-5.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.2.5-5.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2019-6978"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x635-b1cj-m7d7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41560?format=json","vulnerability_id":"VCID-yhfa-jcqy-wkdx","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"},{"reference_url":"http://bugs.libgd.org/?do=details&task_id=70","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=70"},{"reference_url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3475.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3475.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3475","reference_id":"","reference_type":"","scores":[{"value":"0.12094","scoring_system":"epss","scoring_elements":"0.93764","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12094","scoring_system":"epss","scoring_elements":"0.93774","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12094","scoring_system":"epss","scoring_elements":"0.93778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12094","scoring_system":"epss","scoring_elements":"0.93755","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.9443","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94445","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94449","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94452","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94453","published_at":"2026-04-24T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.9445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94454","published_at":"2026-05-05T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94421","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94425","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1443","scoring_system":"epss","scoring_elements":"0.94428","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3475"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475"},{"reference_url":"http://secunia.com/advisories/25860","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25860"},{"reference_url":"http://secunia.com/advisories/26272","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26272"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26415"},{"reference_url":"http://secunia.com/advisories/26467","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26467"},{"reference_url":"http://secunia.com/advisories/26663","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26663"},{"reference_url":"http://secunia.com/advisories/26766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26766"},{"reference_url":"http://secunia.com/advisories/26856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26856"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://secunia.com/advisories/42813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42813"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://issues.rpath.com/browse/RPL-1643","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1643"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9728","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9728"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html"},{"reference_url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24651","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24651"},{"reference_url":"http://www.trustix.org/errata/2007/0024/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0024/"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0022","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277181","reference_id":"277181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277181"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3475","reference_id":"CVE-2007-3475","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3475"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"},{"reference_url":"https://usn.ubuntu.com/854-1/","reference_id":"USN-854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/854-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927392?format=json","purl":"pkg:deb/debian/libgd2@2.0.35.dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.35.dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2007-3475"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yhfa-jcqy-wkdx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81713?format=json","vulnerability_id":"VCID-zp5r-wjhe-u7b3","summary":"gd: NULL pointer dereference in gdImageClone","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14553.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14553.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14553","reference_id":"","reference_type":"","scores":[{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.76696","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.76729","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.76711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.76743","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.76754","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.76782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.76762","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.76795","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.768","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.76791","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.76823","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.7683","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.76841","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00979","scoring_system":"epss","scoring_elements":"0.76831","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1600727","reference_id":"1600727","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1600727"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951287","reference_id":"951287","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4659","reference_id":"RHSA-2020:4659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4659"},{"reference_url":"https://usn.ubuntu.com/4316-1/","reference_id":"USN-4316-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4316-1/"},{"reference_url":"https://usn.ubuntu.com/4316-2/","reference_id":"USN-4316-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4316-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927408?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2018-14553"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zp5r-wjhe-u7b3"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"}