{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60889?format=json","vulnerability_id":"VCID-d277-taud-kydb","summary":"Multiple errors in LittleCMS allow for attacks including the remote\n    execution of arbitrary code.","aliases":[{"alias":"CVE-2009-0723"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85488?format=json","purl":"pkg:ebuild/media-libs/lcms@1.18-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/lcms@1.18-r1"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/128556?format=json","purl":"pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-0.30.b09?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-697d-rrxb-rkbm"},{"vulnerability":"VCID-6dwj-y7qv-bkah"},{"vulnerability":"VCID-8dsm-695w-9yfx"},{"vulnerability":"VCID-d277-taud-kydb"},{"vulnerability":"VCID-g31s-n677-kye3"},{"vulnerability":"VCID-gs9t-z7tn-5fhn"},{"vulnerability":"VCID-hhef-yk98-4fhh"},{"vulnerability":"VCID-ks25-kdxj-m7cr"},{"vulnerability":"VCID-mhvv-yftm-wyek"},{"vulnerability":"VCID-n74p-uev8-v7hc"},{"vulnerability":"VCID-tpv7-d7p6-bbe6"},{"vulnerability":"VCID-tymd-uw95-q7b1"},{"vulnerability":"VCID-uxbc-8sru-c7a6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-0.30.b09%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/128580?format=json","purl":"pkg:rpm/redhat/lcms@1.18-0.1.beta1.el5_3?arch=2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-697d-rrxb-rkbm"},{"vulnerability":"VCID-d277-taud-kydb"},{"vulnerability":"VCID-n74p-uev8-v7hc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/lcms@1.18-0.1.beta1.el5_3%3Farch=2"}],"references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0723.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0723.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0723","reference_id":"","reference_type":"","scores":[{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75116","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74945","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74948","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74977","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74953","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74987","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74989","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75025","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75033","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75023","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75061","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75066","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75069","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75076","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75102","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75127","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75107","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0723"},{"reference_url":"http://scarybeastsecurity.blogspot.com/2009/03/littlecms-vulnerabilities.html","reference_id":"","reference_type":"","scores":[],"url":"http://scarybeastsecurity.blogspot.com/2009/03/littlecms-vulnerabilities.html"},{"reference_url":"http://scary.beasts.org/security/CESA-2009-003.html","reference_id":"","reference_type":"","scores":[],"url":"http://scary.beasts.org/security/CESA-2009-003.html"},{"reference_url":"http://secunia.com/advisories/34367","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34367"},{"reference_url":"http://secunia.com/advisories/34382","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34382"},{"reference_url":"http://secunia.com/advisories/34400","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34400"},{"reference_url":"http://secunia.com/advisories/34408","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34408"},{"reference_url":"http://secunia.com/advisories/34418","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34418"},{"reference_url":"http://secunia.com/advisories/34442","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34442"},{"reference_url":"http://secunia.com/advisories/34450","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34450"},{"reference_url":"http://secunia.com/advisories/34454","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34454"},{"reference_url":"http://secunia.com/advisories/34463","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34463"},{"reference_url":"http://secunia.com/advisories/34632","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34632"},{"reference_url":"http://secunia.com/advisories/34675","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34675"},{"reference_url":"http://secunia.com/advisories/34782","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34782"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200904-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200904-19.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49326","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49326"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.487438","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.487438"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11780","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11780"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-0377.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2009-0377.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00794.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00794.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00799.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00799.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00811.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00811.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00851.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00851.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00856.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00856.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00857.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00857.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00921.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00921.html"},{"reference_url":"http://www.debian.org/security/2009/dsa-1745","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1745"},{"reference_url":"http://www.debian.org/security/2009/dsa-1769","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1769"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:121","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:121"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:137"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:162","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:162"},{"reference_url":"http://www.ocert.org/advisories/ocert-2009-003.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.ocert.org/advisories/ocert-2009-003.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0339.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0339.html"},{"reference_url":"http://www.securityfocus.com/archive/1/502018/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/502018/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/502031/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/502031/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/34185","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/34185"},{"reference_url":"http://www.securitytracker.com/id?1021869","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021869"},{"reference_url":"http://www.ubuntu.com/usn/USN-744-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-744-1"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0775","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0775"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=487508","reference_id":"487508","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=487508"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:little_cms:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:littlecms:little_cms:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:little_cms:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.1:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:3.1:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.1:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0723","reference_id":"CVE-2009-0723","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0723"},{"reference_url":"https://security.gentoo.org/glsa/200904-19","reference_id":"GLSA-200904-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0339","reference_id":"RHSA-2009:0339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0377","reference_id":"RHSA-2009:0377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0377"},{"reference_url":"https://usn.ubuntu.com/744-1/","reference_id":"USN-744-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/744-1/"}],"weaknesses":[{"cwe_id":190,"name":"Integer Overflow or Wraparound","description":"The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control."}],"exploits":[],"severity_range_score":"9.3 - 9.3","exploitability":"0.5","weighted_severity":"8.4","risk_score":4.2,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d277-taud-kydb"}