{"url":"http://public2.vulnerablecode.io/api/packages/927395?format=json","purl":"pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3.1?distro=trixie","type":"deb","namespace":"debian","name":"libgd2","version":"2.0.36~rc1~dfsg-3.1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.1.0-4","latest_non_vulnerable_version":"2.3.3-13","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41480?format=json","vulnerability_id":"VCID-4ehv-84qa-fubx","summary":"The GD library is prone to a buffer overflow vulnerability.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3546","reference_id":"","reference_type":"","scores":[{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88589","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88643","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.8858","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89349","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89352","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89361","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89322","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89319","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89332","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89331","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89327","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89345","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=529213","reference_id":"529213","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=529213"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534","reference_id":"552534","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525","reference_id":"601525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://security.gentoo.org/glsa/201001-03","reference_id":"GLSA-201001-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201001-03"},{"reference_url":"https://security.gentoo.org/glsa/201006-16","reference_id":"GLSA-201006-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201006-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0003","reference_id":"RHSA-2010:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0040","reference_id":"RHSA-2010:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0040"},{"reference_url":"https://usn.ubuntu.com/854-1/","reference_id":"USN-854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/854-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/927395?format=json","purl":"pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927387?format=json","purl":"pkg:deb/debian/libgd2@2.3.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927385?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927388?format=json","purl":"pkg:deb/debian/libgd2@2.3.3-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.3.3-13%3Fdistro=trixie"}],"aliases":["CVE-2009-3546"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ehv-84qa-fubx"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgd2@2.0.36~rc1~dfsg-3.1%3Fdistro=trixie"}