{"url":"http://public2.vulnerablecode.io/api/packages/937412?format=json","purl":"pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie","type":"deb","namespace":"debian","name":"racket","version":"8.16+dfsg1-3","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"8.18+dfsg1-1","latest_non_vulnerable_version":"8.18+dfsg1-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41480?format=json","vulnerability_id":"VCID-4ehv-84qa-fubx","summary":"The GD library is prone to a buffer overflow vulnerability.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3546","reference_id":"","reference_type":"","scores":[{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.8858","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88589","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88643","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89349","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89352","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89322","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89319","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89332","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89331","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89327","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04663","scoring_system":"epss","scoring_elements":"0.89345","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=529213","reference_id":"529213","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=529213"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534","reference_id":"552534","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525","reference_id":"601525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://security.gentoo.org/glsa/201001-03","reference_id":"GLSA-201001-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201001-03"},{"reference_url":"https://security.gentoo.org/glsa/201006-16","reference_id":"GLSA-201006-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201006-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0003","reference_id":"RHSA-2010:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0040","reference_id":"RHSA-2010:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0040"},{"reference_url":"https://usn.ubuntu.com/854-1/","reference_id":"USN-854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/854-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/937409?format=json","purl":"pkg:deb/debian/racket@5.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@5.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937410?format=json","purl":"pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@7.9%252Bdfsg1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937408?format=json","purl":"pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.7%252Bdfsg1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937412?format=json","purl":"pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.16%252Bdfsg1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937411?format=json","purl":"pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.18%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2009-3546"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ehv-84qa-fubx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41563?format=json","vulnerability_id":"VCID-7d1e-wnq6-4qfr","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"},{"reference_url":"http://bugs.libgd.org/?do=details&task_id=74","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=74"},{"reference_url":"http://bugs.libgd.org/?do=details&task_id=92","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=92"},{"reference_url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"},{"reference_url":"http://osvdb.org/42062","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/42062"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3477.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3477.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3477","reference_id":"","reference_type":"","scores":[{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.9162","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.91622","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.91601","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.91599","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.91621","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.91616","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07202","scoring_system":"epss","scoring_elements":"0.91624","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07483","scoring_system":"epss","scoring_elements":"0.91789","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07483","scoring_system":"epss","scoring_elements":"0.91753","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07483","scoring_system":"epss","scoring_elements":"0.91759","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07483","scoring_system":"epss","scoring_elements":"0.91766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07483","scoring_system":"epss","scoring_elements":"0.91779","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07483","scoring_system":"epss","scoring_elements":"0.91786","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07483","scoring_system":"epss","scoring_elements":"0.91745","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3477"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477"},{"reference_url":"http://secunia.com/advisories/25860","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25860"},{"reference_url":"http://secunia.com/advisories/26272","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26272"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26415"},{"reference_url":"http://secunia.com/advisories/26467","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26467"},{"reference_url":"http://secunia.com/advisories/26663","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26663"},{"reference_url":"http://secunia.com/advisories/26766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26766"},{"reference_url":"http://secunia.com/advisories/26856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26856"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://secunia.com/advisories/31168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31168"},{"reference_url":"http://secunia.com/advisories/42813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42813"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://issues.rpath.com/browse/RPL-1643","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1643"},{"reference_url":"http://www.debian.org/security/2008/dsa-1613","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1613"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html"},{"reference_url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"},{"reference_url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24651","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24651"},{"reference_url":"http://www.trustix.org/errata/2007/0024/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0024/"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0022","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277221","reference_id":"277221","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277221"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525","reference_id":"601525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3477","reference_id":"CVE-2007-3477","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3477"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://usn.ubuntu.com/854-1/","reference_id":"USN-854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/854-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/937409?format=json","purl":"pkg:deb/debian/racket@5.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@5.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937410?format=json","purl":"pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@7.9%252Bdfsg1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937408?format=json","purl":"pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.7%252Bdfsg1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937412?format=json","purl":"pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.16%252Bdfsg1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937411?format=json","purl":"pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.18%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2007-3477"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7d1e-wnq6-4qfr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94760?format=json","vulnerability_id":"VCID-ez59-j9hv-aba1","summary":"Racket is a general-purpose programming language and an ecosystem for language-oriented programming. In versions prior to 8.2, code evaluated using the Racket sandbox could cause system modules to incorrectly use attacker-created modules instead of their intended dependencies. This could allow system functions to be controlled by the attacker, giving access to facilities intended to be restricted. This problem is fixed in Racket version 8.2. A workaround is available, depending on system settings. For systems that provide arbitrary Racket evaluation, external sandboxing such as containers limit the impact of the problem. For multi-user evaluation systems, such as the `handin-server` system, it is not possible to work around this problem and upgrading is required.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32773","reference_id":"","reference_type":"","scores":[{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41702","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41845","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41909","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41937","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41865","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41915","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41926","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.4195","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41914","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41901","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41951","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41924","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41853","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41781","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32773"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991327","reference_id":"991327","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991327"},{"reference_url":"https://security.archlinux.org/ASA-202107-39","reference_id":"ASA-202107-39","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-39"},{"reference_url":"https://security.archlinux.org/AVG-2175","reference_id":"AVG-2175","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2175"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/937410?format=json","purl":"pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@7.9%252Bdfsg1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937408?format=json","purl":"pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.7%252Bdfsg1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937412?format=json","purl":"pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.16%252Bdfsg1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937411?format=json","purl":"pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.18%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2021-32773"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ez59-j9hv-aba1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42237?format=json","vulnerability_id":"VCID-svg5-jd8s-mbb5","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3996","reference_id":"","reference_type":"","scores":[{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92838","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92849","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92847","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92874","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92875","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.9288","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13543","scoring_system":"epss","scoring_elements":"0.94249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94613","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3996"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278031","reference_id":"278031","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278031"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456","reference_id":"443456","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525","reference_id":"601525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0888","reference_id":"RHSA-2007:0888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://usn.ubuntu.com/557-1/","reference_id":"USN-557-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/557-1/"},{"reference_url":"https://usn.ubuntu.com/720-1/","reference_id":"USN-720-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/720-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/937409?format=json","purl":"pkg:deb/debian/racket@5.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@5.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937410?format=json","purl":"pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@7.9%252Bdfsg1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937408?format=json","purl":"pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.7%252Bdfsg1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937412?format=json","purl":"pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.16%252Bdfsg1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937411?format=json","purl":"pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.18%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2007-3996"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-svg5-jd8s-mbb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41562?format=json","vulnerability_id":"VCID-vqee-h72u-hbar","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"},{"reference_url":"http://bugs.libgd.org/?do=details&task_id=87","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=87"},{"reference_url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/updates/FEDORA-2007-205.shtml"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"},{"reference_url":"http://osvdb.org/37741","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/37741"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3476.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3476.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3476","reference_id":"","reference_type":"","scores":[{"value":"0.05321","scoring_system":"epss","scoring_elements":"0.90021","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05321","scoring_system":"epss","scoring_elements":"0.90001","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05321","scoring_system":"epss","scoring_elements":"0.90003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05321","scoring_system":"epss","scoring_elements":"0.90015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.9108","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91065","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91071","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91107","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91121","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06471","scoring_system":"epss","scoring_elements":"0.91081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07951","scoring_system":"epss","scoring_elements":"0.92076","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07951","scoring_system":"epss","scoring_elements":"0.92073","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3476"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476"},{"reference_url":"http://secunia.com/advisories/25860","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25860"},{"reference_url":"http://secunia.com/advisories/26272","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26272"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26415","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26415"},{"reference_url":"http://secunia.com/advisories/26467","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26467"},{"reference_url":"http://secunia.com/advisories/26663","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26663"},{"reference_url":"http://secunia.com/advisories/26766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26766"},{"reference_url":"http://secunia.com/advisories/26856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26856"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://secunia.com/advisories/31168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31168"},{"reference_url":"http://secunia.com/advisories/42813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42813"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://issues.rpath.com/browse/RPL-1643","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1643"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348"},{"reference_url":"http://www.debian.org/security/2008/dsa-1613","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1613"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_15_sr.html"},{"reference_url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/478796/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24651","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24651"},{"reference_url":"http://www.trustix.org/errata/2007/0024/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0024/"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0022","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277201","reference_id":"277201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277201"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525","reference_id":"601525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library:gdlib:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3476","reference_id":"CVE-2007-3476","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3476"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"},{"reference_url":"https://usn.ubuntu.com/854-1/","reference_id":"USN-854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/854-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/937409?format=json","purl":"pkg:deb/debian/racket@5.0.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@5.0.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937410?format=json","purl":"pkg:deb/debian/racket@7.9%2Bdfsg1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@7.9%252Bdfsg1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937408?format=json","purl":"pkg:deb/debian/racket@8.7%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.7%252Bdfsg1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937412?format=json","purl":"pkg:deb/debian/racket@8.16%2Bdfsg1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.16%252Bdfsg1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/937411?format=json","purl":"pkg:deb/debian/racket@8.18%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.18%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2007-3476"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqee-h72u-hbar"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/racket@8.16%252Bdfsg1-3%3Fdistro=trixie"}