Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-d277-taud-kydb
Summary
Multiple errors in LittleCMS allow for attacks including the remote
    execution of arbitrary code.
Aliases
0
alias CVE-2009-0723
Fixed_packages
0
url pkg:ebuild/media-libs/lcms@1.18-r1
purl pkg:ebuild/media-libs/lcms@1.18-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/lcms@1.18-r1
Affected_packages
0
url pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-0.30.b09?arch=el5
purl pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-0.30.b09?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-697d-rrxb-rkbm
1
vulnerability VCID-6dwj-y7qv-bkah
2
vulnerability VCID-8dsm-695w-9yfx
3
vulnerability VCID-d277-taud-kydb
4
vulnerability VCID-g31s-n677-kye3
5
vulnerability VCID-gs9t-z7tn-5fhn
6
vulnerability VCID-hhef-yk98-4fhh
7
vulnerability VCID-ks25-kdxj-m7cr
8
vulnerability VCID-mhvv-yftm-wyek
9
vulnerability VCID-n74p-uev8-v7hc
10
vulnerability VCID-tpv7-d7p6-bbe6
11
vulnerability VCID-tymd-uw95-q7b1
12
vulnerability VCID-uxbc-8sru-c7a6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-0.30.b09%3Farch=el5
1
url pkg:rpm/redhat/lcms@1.18-0.1.beta1.el5_3?arch=2
purl pkg:rpm/redhat/lcms@1.18-0.1.beta1.el5_3?arch=2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-697d-rrxb-rkbm
1
vulnerability VCID-d277-taud-kydb
2
vulnerability VCID-n74p-uev8-v7hc
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/lcms@1.18-0.1.beta1.el5_3%3Farch=2
References
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0723.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0723.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0723
reference_id
reference_type
scores
0
value 0.00858
scoring_system epss
scoring_elements 0.75102
published_at 2026-05-07T12:55:00Z
1
value 0.00858
scoring_system epss
scoring_elements 0.74945
published_at 2026-04-01T12:55:00Z
2
value 0.00858
scoring_system epss
scoring_elements 0.74948
published_at 2026-04-02T12:55:00Z
3
value 0.00858
scoring_system epss
scoring_elements 0.74977
published_at 2026-04-04T12:55:00Z
4
value 0.00858
scoring_system epss
scoring_elements 0.74953
published_at 2026-04-07T12:55:00Z
5
value 0.00858
scoring_system epss
scoring_elements 0.74987
published_at 2026-04-08T12:55:00Z
6
value 0.00858
scoring_system epss
scoring_elements 0.74999
published_at 2026-04-09T12:55:00Z
7
value 0.00858
scoring_system epss
scoring_elements 0.75021
published_at 2026-04-11T12:55:00Z
8
value 0.00858
scoring_system epss
scoring_elements 0.75
published_at 2026-04-12T12:55:00Z
9
value 0.00858
scoring_system epss
scoring_elements 0.74989
published_at 2026-04-13T12:55:00Z
10
value 0.00858
scoring_system epss
scoring_elements 0.75025
published_at 2026-04-16T12:55:00Z
11
value 0.00858
scoring_system epss
scoring_elements 0.75033
published_at 2026-04-18T12:55:00Z
12
value 0.00858
scoring_system epss
scoring_elements 0.75023
published_at 2026-04-21T12:55:00Z
13
value 0.00858
scoring_system epss
scoring_elements 0.75061
published_at 2026-04-24T12:55:00Z
14
value 0.00858
scoring_system epss
scoring_elements 0.75066
published_at 2026-04-26T12:55:00Z
15
value 0.00858
scoring_system epss
scoring_elements 0.75069
published_at 2026-04-29T12:55:00Z
16
value 0.00858
scoring_system epss
scoring_elements 0.75076
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0723
3
reference_url http://scarybeastsecurity.blogspot.com/2009/03/littlecms-vulnerabilities.html
reference_id
reference_type
scores
url http://scarybeastsecurity.blogspot.com/2009/03/littlecms-vulnerabilities.html
4
reference_url http://scary.beasts.org/security/CESA-2009-003.html
reference_id
reference_type
scores
url http://scary.beasts.org/security/CESA-2009-003.html
5
reference_url http://secunia.com/advisories/34367
reference_id
reference_type
scores
url http://secunia.com/advisories/34367
6
reference_url http://secunia.com/advisories/34382
reference_id
reference_type
scores
url http://secunia.com/advisories/34382
7
reference_url http://secunia.com/advisories/34400
reference_id
reference_type
scores
url http://secunia.com/advisories/34400
8
reference_url http://secunia.com/advisories/34408
reference_id
reference_type
scores
url http://secunia.com/advisories/34408
9
reference_url http://secunia.com/advisories/34418
reference_id
reference_type
scores
url http://secunia.com/advisories/34418
10
reference_url http://secunia.com/advisories/34442
reference_id
reference_type
scores
url http://secunia.com/advisories/34442
11
reference_url http://secunia.com/advisories/34450
reference_id
reference_type
scores
url http://secunia.com/advisories/34450
12
reference_url http://secunia.com/advisories/34454
reference_id
reference_type
scores
url http://secunia.com/advisories/34454
13
reference_url http://secunia.com/advisories/34463
reference_id
reference_type
scores
url http://secunia.com/advisories/34463
14
reference_url http://secunia.com/advisories/34632
reference_id
reference_type
scores
url http://secunia.com/advisories/34632
15
reference_url http://secunia.com/advisories/34675
reference_id
reference_type
scores
url http://secunia.com/advisories/34675
16
reference_url http://secunia.com/advisories/34782
reference_id
reference_type
scores
url http://secunia.com/advisories/34782
17
reference_url http://security.gentoo.org/glsa/glsa-200904-19.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200904-19.xml
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/49326
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/49326
19
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.487438
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.487438
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11780
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11780
21
reference_url https://rhn.redhat.com/errata/RHSA-2009-0377.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2009-0377.html
22
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00794.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00794.html
23
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00799.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00799.html
24
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00811.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00811.html
25
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00851.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00851.html
26
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00856.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00856.html
27
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00857.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00857.html
28
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00921.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00921.html
29
reference_url http://www.debian.org/security/2009/dsa-1745
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1745
30
reference_url http://www.debian.org/security/2009/dsa-1769
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1769
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:121
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:121
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:137
33
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:162
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:162
34
reference_url http://www.ocert.org/advisories/ocert-2009-003.html
reference_id
reference_type
scores
url http://www.ocert.org/advisories/ocert-2009-003.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2009-0339.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0339.html
36
reference_url http://www.securityfocus.com/archive/1/502018/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/502018/100/0/threaded
37
reference_url http://www.securityfocus.com/archive/1/502031/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/502031/100/0/threaded
38
reference_url http://www.securityfocus.com/bid/34185
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/34185
39
reference_url http://www.securitytracker.com/id?1021869
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021869
40
reference_url http://www.ubuntu.com/usn/USN-744-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-744-1
41
reference_url http://www.vupen.com/english/advisories/2009/0775
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0775
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=487508
reference_id 487508
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=487508
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:little_cms:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:littlecms:little_cms:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:little_cms:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.1:beta1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0723
reference_id CVE-2009-0723
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2009-0723
48
reference_url https://security.gentoo.org/glsa/200904-19
reference_id GLSA-200904-19
reference_type
scores
url https://security.gentoo.org/glsa/200904-19
49
reference_url https://access.redhat.com/errata/RHSA-2009:0339
reference_id RHSA-2009:0339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0339
50
reference_url https://access.redhat.com/errata/RHSA-2009:0377
reference_id RHSA-2009:0377
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0377
51
reference_url https://usn.ubuntu.com/744-1/
reference_id USN-744-1
reference_type
scores
url https://usn.ubuntu.com/744-1/
Weaknesses
0
cwe_id 190
name Integer Overflow or Wraparound
description The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Exploits
Severity_range_score9.3 - 9.3
Exploitability0.5
Weighted_severity8.4
Risk_score4.2
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-d277-taud-kydb