Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie
Typedeb
Namespacedebian
Nameracket
Version8.16+dfsg1-3
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.18+dfsg1-1
Latest_non_vulnerable_version8.18+dfsg1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4ehv-84qa-fubx
vulnerability_id VCID-4ehv-84qa-fubx
summary The GD library is prone to a buffer overflow vulnerability.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3546
reference_id
reference_type
scores
0
value 0.04125
scoring_system epss
scoring_elements 0.8858
published_at 2026-04-01T12:55:00Z
1
value 0.04125
scoring_system epss
scoring_elements 0.88589
published_at 2026-04-02T12:55:00Z
2
value 0.04125
scoring_system epss
scoring_elements 0.88606
published_at 2026-04-04T12:55:00Z
3
value 0.04125
scoring_system epss
scoring_elements 0.88608
published_at 2026-04-07T12:55:00Z
4
value 0.04125
scoring_system epss
scoring_elements 0.88627
published_at 2026-04-08T12:55:00Z
5
value 0.04125
scoring_system epss
scoring_elements 0.88631
published_at 2026-04-09T12:55:00Z
6
value 0.04125
scoring_system epss
scoring_elements 0.88643
published_at 2026-04-11T12:55:00Z
7
value 0.04663
scoring_system epss
scoring_elements 0.89349
published_at 2026-04-26T12:55:00Z
8
value 0.04663
scoring_system epss
scoring_elements 0.89352
published_at 2026-04-29T12:55:00Z
9
value 0.04663
scoring_system epss
scoring_elements 0.89322
published_at 2026-04-12T12:55:00Z
10
value 0.04663
scoring_system epss
scoring_elements 0.89319
published_at 2026-04-13T12:55:00Z
11
value 0.04663
scoring_system epss
scoring_elements 0.89332
published_at 2026-04-16T12:55:00Z
12
value 0.04663
scoring_system epss
scoring_elements 0.89331
published_at 2026-04-18T12:55:00Z
13
value 0.04663
scoring_system epss
scoring_elements 0.89327
published_at 2026-04-21T12:55:00Z
14
value 0.04663
scoring_system epss
scoring_elements 0.89345
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=529213
reference_id 529213
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=529213
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534
reference_id 552534
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
reference_id 601525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
6
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
7
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
8
reference_url https://security.gentoo.org/glsa/201001-03
reference_id GLSA-201001-03
reference_type
scores
url https://security.gentoo.org/glsa/201001-03
9
reference_url https://security.gentoo.org/glsa/201006-16
reference_id GLSA-201006-16
reference_type
scores
url https://security.gentoo.org/glsa/201006-16
10
reference_url https://access.redhat.com/errata/RHSA-2010:0003
reference_id RHSA-2010:0003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0003
11
reference_url https://access.redhat.com/errata/RHSA-2010:0040
reference_id RHSA-2010:0040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0040
12
reference_url https://usn.ubuntu.com/854-1/
reference_id USN-854-1
reference_type
scores
url https://usn.ubuntu.com/854-1/
fixed_packages
0
url pkg:deb/debian/racket@5.0.2-1?distro=trixie
purl pkg:deb/debian/racket@5.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@5.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@7.9%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.7%252Bdfsg1-1%3Fdistro=trixie
3
url pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie
purl pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.16%252Bdfsg1-3%3Fdistro=trixie
4
url pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.18%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2009-3546
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ehv-84qa-fubx
1
url VCID-7d1e-wnq6-4qfr
vulnerability_id VCID-7d1e-wnq6-4qfr
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
reference_id
reference_type
scores
url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
1
reference_url http://bugs.libgd.org/?do=details&task_id=74
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=74
2
reference_url http://bugs.libgd.org/?do=details&task_id=92
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=92
3
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
6
reference_url http://osvdb.org/42062
reference_id
reference_type
scores
url http://osvdb.org/42062
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3477.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3477.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3477
reference_id
reference_type
scores
0
value 0.07202
scoring_system epss
scoring_elements 0.9162
published_at 2026-04-29T12:55:00Z
1
value 0.07202
scoring_system epss
scoring_elements 0.91622
published_at 2026-04-26T12:55:00Z
2
value 0.07202
scoring_system epss
scoring_elements 0.91601
published_at 2026-04-12T12:55:00Z
3
value 0.07202
scoring_system epss
scoring_elements 0.91599
published_at 2026-04-13T12:55:00Z
4
value 0.07202
scoring_system epss
scoring_elements 0.91621
published_at 2026-04-16T12:55:00Z
5
value 0.07202
scoring_system epss
scoring_elements 0.91616
published_at 2026-04-21T12:55:00Z
6
value 0.07202
scoring_system epss
scoring_elements 0.91624
published_at 2026-04-24T12:55:00Z
7
value 0.07483
scoring_system epss
scoring_elements 0.91789
published_at 2026-04-11T12:55:00Z
8
value 0.07483
scoring_system epss
scoring_elements 0.91753
published_at 2026-04-02T12:55:00Z
9
value 0.07483
scoring_system epss
scoring_elements 0.91759
published_at 2026-04-04T12:55:00Z
10
value 0.07483
scoring_system epss
scoring_elements 0.91766
published_at 2026-04-07T12:55:00Z
11
value 0.07483
scoring_system epss
scoring_elements 0.91779
published_at 2026-04-08T12:55:00Z
12
value 0.07483
scoring_system epss
scoring_elements 0.91786
published_at 2026-04-09T12:55:00Z
13
value 0.07483
scoring_system epss
scoring_elements 0.91745
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3477
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477
11
reference_url http://secunia.com/advisories/25860
reference_id
reference_type
scores
url http://secunia.com/advisories/25860
12
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
13
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
14
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
15
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
16
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
17
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
18
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
19
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
20
reference_url http://secunia.com/advisories/31168
reference_id
reference_type
scores
url http://secunia.com/advisories/31168
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
23
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
24
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
25
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
26
reference_url http://www.debian.org/security/2008/dsa-1613
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1613
27
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
28
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
29
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
30
reference_url http://www.novell.com/linux/security/advisories/2007_15_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_15_sr.html
31
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
32
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
33
reference_url http://www.securityfocus.com/bid/24651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24651
34
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
35
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277221
reference_id 277221
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277221
37
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
reference_id 601525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
38
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
39
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3477
reference_id CVE-2007-3477
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3477
50
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
51
reference_url https://usn.ubuntu.com/854-1/
reference_id USN-854-1
reference_type
scores
url https://usn.ubuntu.com/854-1/
fixed_packages
0
url pkg:deb/debian/racket@5.0.2-1?distro=trixie
purl pkg:deb/debian/racket@5.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@5.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@7.9%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.7%252Bdfsg1-1%3Fdistro=trixie
3
url pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie
purl pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.16%252Bdfsg1-3%3Fdistro=trixie
4
url pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.18%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-3477
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7d1e-wnq6-4qfr
2
url VCID-ez59-j9hv-aba1
vulnerability_id VCID-ez59-j9hv-aba1
summary Racket is a general-purpose programming language and an ecosystem for language-oriented programming. In versions prior to 8.2, code evaluated using the Racket sandbox could cause system modules to incorrectly use attacker-created modules instead of their intended dependencies. This could allow system functions to be controlled by the attacker, giving access to facilities intended to be restricted. This problem is fixed in Racket version 8.2. A workaround is available, depending on system settings. For systems that provide arbitrary Racket evaluation, external sandboxing such as containers limit the impact of the problem. For multi-user evaluation systems, such as the `handin-server` system, it is not possible to work around this problem and upgrading is required.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32773
reference_id
reference_type
scores
0
value 0.00198
scoring_system epss
scoring_elements 0.41702
published_at 2026-04-29T12:55:00Z
1
value 0.00198
scoring_system epss
scoring_elements 0.41845
published_at 2026-04-01T12:55:00Z
2
value 0.00198
scoring_system epss
scoring_elements 0.41909
published_at 2026-04-02T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.41937
published_at 2026-04-04T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.41865
published_at 2026-04-07T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.41915
published_at 2026-04-08T12:55:00Z
6
value 0.00198
scoring_system epss
scoring_elements 0.41926
published_at 2026-04-09T12:55:00Z
7
value 0.00198
scoring_system epss
scoring_elements 0.4195
published_at 2026-04-11T12:55:00Z
8
value 0.00198
scoring_system epss
scoring_elements 0.41914
published_at 2026-04-12T12:55:00Z
9
value 0.00198
scoring_system epss
scoring_elements 0.41901
published_at 2026-04-13T12:55:00Z
10
value 0.00198
scoring_system epss
scoring_elements 0.41951
published_at 2026-04-16T12:55:00Z
11
value 0.00198
scoring_system epss
scoring_elements 0.41924
published_at 2026-04-18T12:55:00Z
12
value 0.00198
scoring_system epss
scoring_elements 0.41853
published_at 2026-04-21T12:55:00Z
13
value 0.00198
scoring_system epss
scoring_elements 0.41781
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32773
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32773
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991327
reference_id 991327
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991327
3
reference_url https://security.archlinux.org/ASA-202107-39
reference_id ASA-202107-39
reference_type
scores
url https://security.archlinux.org/ASA-202107-39
4
reference_url https://security.archlinux.org/AVG-2175
reference_id AVG-2175
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2175
fixed_packages
0
url pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@7.9%252Bdfsg1-2%3Fdistro=trixie
1
url pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.7%252Bdfsg1-1%3Fdistro=trixie
2
url pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie
purl pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.16%252Bdfsg1-3%3Fdistro=trixie
3
url pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.18%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2021-32773
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ez59-j9hv-aba1
3
url VCID-svg5-jd8s-mbb5
vulnerability_id VCID-svg5-jd8s-mbb5
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3996
reference_id
reference_type
scores
0
value 0.09573
scoring_system epss
scoring_elements 0.92838
published_at 2026-04-01T12:55:00Z
1
value 0.09573
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-02T12:55:00Z
2
value 0.09573
scoring_system epss
scoring_elements 0.92849
published_at 2026-04-04T12:55:00Z
3
value 0.09573
scoring_system epss
scoring_elements 0.92847
published_at 2026-04-07T12:55:00Z
4
value 0.09573
scoring_system epss
scoring_elements 0.92856
published_at 2026-04-08T12:55:00Z
5
value 0.09573
scoring_system epss
scoring_elements 0.92859
published_at 2026-04-09T12:55:00Z
6
value 0.09573
scoring_system epss
scoring_elements 0.92864
published_at 2026-04-13T12:55:00Z
7
value 0.09573
scoring_system epss
scoring_elements 0.92874
published_at 2026-04-16T12:55:00Z
8
value 0.09573
scoring_system epss
scoring_elements 0.92875
published_at 2026-04-18T12:55:00Z
9
value 0.09573
scoring_system epss
scoring_elements 0.9288
published_at 2026-04-21T12:55:00Z
10
value 0.13543
scoring_system epss
scoring_elements 0.94249
published_at 2026-04-24T12:55:00Z
11
value 0.15128
scoring_system epss
scoring_elements 0.94613
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3996
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278031
reference_id 278031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278031
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456
reference_id 443456
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
reference_id 601525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
6
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
7
reference_url https://access.redhat.com/errata/RHSA-2007:0888
reference_id RHSA-2007:0888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0888
8
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
9
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
10
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
11
reference_url https://usn.ubuntu.com/557-1/
reference_id USN-557-1
reference_type
scores
url https://usn.ubuntu.com/557-1/
12
reference_url https://usn.ubuntu.com/720-1/
reference_id USN-720-1
reference_type
scores
url https://usn.ubuntu.com/720-1/
fixed_packages
0
url pkg:deb/debian/racket@5.0.2-1?distro=trixie
purl pkg:deb/debian/racket@5.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@5.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@7.9%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.7%252Bdfsg1-1%3Fdistro=trixie
3
url pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie
purl pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.16%252Bdfsg1-3%3Fdistro=trixie
4
url pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.18%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-3996
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-svg5-jd8s-mbb5
4
url VCID-vqee-h72u-hbar
vulnerability_id VCID-vqee-h72u-hbar
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
reference_id
reference_type
scores
url ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
1
reference_url http://bugs.libgd.org/?do=details&task_id=87
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=87
2
reference_url http://fedoranews.org/updates/FEDORA-2007-205.shtml
reference_id
reference_type
scores
url http://fedoranews.org/updates/FEDORA-2007-205.shtml
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
5
reference_url http://osvdb.org/37741
reference_id
reference_type
scores
url http://osvdb.org/37741
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3476.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3476.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3476
reference_id
reference_type
scores
0
value 0.05321
scoring_system epss
scoring_elements 0.90021
published_at 2026-04-07T12:55:00Z
1
value 0.05321
scoring_system epss
scoring_elements 0.90001
published_at 2026-04-01T12:55:00Z
2
value 0.05321
scoring_system epss
scoring_elements 0.90003
published_at 2026-04-02T12:55:00Z
3
value 0.05321
scoring_system epss
scoring_elements 0.90015
published_at 2026-04-04T12:55:00Z
4
value 0.06471
scoring_system epss
scoring_elements 0.9108
published_at 2026-04-12T12:55:00Z
5
value 0.06471
scoring_system epss
scoring_elements 0.91065
published_at 2026-04-08T12:55:00Z
6
value 0.06471
scoring_system epss
scoring_elements 0.91071
published_at 2026-04-09T12:55:00Z
7
value 0.06471
scoring_system epss
scoring_elements 0.91105
published_at 2026-04-18T12:55:00Z
8
value 0.06471
scoring_system epss
scoring_elements 0.91107
published_at 2026-04-21T12:55:00Z
9
value 0.06471
scoring_system epss
scoring_elements 0.91121
published_at 2026-04-24T12:55:00Z
10
value 0.06471
scoring_system epss
scoring_elements 0.91081
published_at 2026-04-13T12:55:00Z
11
value 0.07951
scoring_system epss
scoring_elements 0.92076
published_at 2026-04-26T12:55:00Z
12
value 0.07951
scoring_system epss
scoring_elements 0.92073
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3476
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277421
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277421
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476
10
reference_url http://secunia.com/advisories/25860
reference_id
reference_type
scores
url http://secunia.com/advisories/25860
11
reference_url http://secunia.com/advisories/26272
reference_id
reference_type
scores
url http://secunia.com/advisories/26272
12
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
13
reference_url http://secunia.com/advisories/26415
reference_id
reference_type
scores
url http://secunia.com/advisories/26415
14
reference_url http://secunia.com/advisories/26467
reference_id
reference_type
scores
url http://secunia.com/advisories/26467
15
reference_url http://secunia.com/advisories/26663
reference_id
reference_type
scores
url http://secunia.com/advisories/26663
16
reference_url http://secunia.com/advisories/26766
reference_id
reference_type
scores
url http://secunia.com/advisories/26766
17
reference_url http://secunia.com/advisories/26856
reference_id
reference_type
scores
url http://secunia.com/advisories/26856
18
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
19
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
20
reference_url http://secunia.com/advisories/31168
reference_id
reference_type
scores
url http://secunia.com/advisories/31168
21
reference_url http://secunia.com/advisories/42813
reference_id
reference_type
scores
url http://secunia.com/advisories/42813
22
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
23
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
24
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
25
reference_url https://issues.rpath.com/browse/RPL-1643
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1643
26
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348
27
reference_url http://www.debian.org/security/2008/dsa-1613
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1613
28
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
29
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
30
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
31
reference_url http://www.novell.com/linux/security/advisories/2007_15_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_15_sr.html
32
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
34
reference_url http://www.securityfocus.com/archive/1/478796/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/478796/100/0/threaded
35
reference_url http://www.securityfocus.com/bid/24651
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24651
36
reference_url http://www.trustix.org/errata/2007/0024/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0024/
37
reference_url http://www.vupen.com/english/advisories/2011/0022
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0022
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277201
reference_id 277201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277201
39
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
reference_id 601525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3476
reference_id CVE-2007-3476
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3476
42
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
43
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
44
reference_url https://usn.ubuntu.com/854-1/
reference_id USN-854-1
reference_type
scores
url https://usn.ubuntu.com/854-1/
fixed_packages
0
url pkg:deb/debian/racket@5.0.2-1?distro=trixie
purl pkg:deb/debian/racket@5.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@5.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@7.9%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.7%252Bdfsg1-1%3Fdistro=trixie
3
url pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie
purl pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.16%252Bdfsg1-3%3Fdistro=trixie
4
url pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.18%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-3476
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqee-h72u-hbar
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.16%252Bdfsg1-3%3Fdistro=trixie