Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/graphviz@2.2.1-1sarge1
Typedeb
Namespacedebian
Namegraphviz
Version2.2.1-1sarge1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.42.4-3
Latest_non_vulnerable_version2.42.4-3
Affected_by_vulnerabilities
0
url VCID-5ufx-caw4-pugf
vulnerability_id VCID-5ufx-caw4-pugf
summary buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1236.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1236.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1236
reference_id
reference_type
scores
0
value 0.07859
scoring_system epss
scoring_elements 0.91967
published_at 2026-04-01T12:55:00Z
1
value 0.07859
scoring_system epss
scoring_elements 0.91975
published_at 2026-04-02T12:55:00Z
2
value 0.07859
scoring_system epss
scoring_elements 0.91983
published_at 2026-04-04T12:55:00Z
3
value 0.07859
scoring_system epss
scoring_elements 0.91989
published_at 2026-04-07T12:55:00Z
4
value 0.07859
scoring_system epss
scoring_elements 0.92001
published_at 2026-04-08T12:55:00Z
5
value 0.07859
scoring_system epss
scoring_elements 0.92005
published_at 2026-04-13T12:55:00Z
6
value 0.07859
scoring_system epss
scoring_elements 0.92008
published_at 2026-04-12T12:55:00Z
7
value 0.07859
scoring_system epss
scoring_elements 0.92023
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1236
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0978
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1236
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1236
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1050872
reference_id 1050872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1050872
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734745
reference_id 734745
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734745
6
reference_url https://security.gentoo.org/glsa/201702-06
reference_id GLSA-201702-06
reference_type
scores
url https://security.gentoo.org/glsa/201702-06
7
reference_url https://usn.ubuntu.com/2083-1/
reference_id USN-2083-1
reference_type
scores
url https://usn.ubuntu.com/2083-1/
fixed_packages
0
url pkg:deb/debian/graphviz@2.26.3-14%2Bdeb7u2
purl pkg:deb/debian/graphviz@2.26.3-14%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5ufx-caw4-pugf
1
vulnerability VCID-bst1-9mr8-u3ab
2
vulnerability VCID-ftef-9uwy-g3gc
3
vulnerability VCID-gytk-7hp5-hkgt
4
vulnerability VCID-hn88-6rd6-auh3
5
vulnerability VCID-u23g-vzrm-cbh3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphviz@2.26.3-14%252Bdeb7u2
1
url pkg:deb/debian/graphviz@2.38.0-7
purl pkg:deb/debian/graphviz@2.38.0-7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ftef-9uwy-g3gc
1
vulnerability VCID-gytk-7hp5-hkgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphviz@2.38.0-7
aliases CVE-2014-1236
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ufx-caw4-pugf
1
url VCID-bst1-9mr8-u3ab
vulnerability_id VCID-bst1-9mr8-u3ab
summary buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0978.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0978.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0978
reference_id
reference_type
scores
0
value 0.06542
scoring_system epss
scoring_elements 0.9108
published_at 2026-04-01T12:55:00Z
1
value 0.06542
scoring_system epss
scoring_elements 0.91086
published_at 2026-04-02T12:55:00Z
2
value 0.06542
scoring_system epss
scoring_elements 0.91094
published_at 2026-04-04T12:55:00Z
3
value 0.06542
scoring_system epss
scoring_elements 0.91102
published_at 2026-04-07T12:55:00Z
4
value 0.06542
scoring_system epss
scoring_elements 0.91115
published_at 2026-04-08T12:55:00Z
5
value 0.06542
scoring_system epss
scoring_elements 0.91121
published_at 2026-04-09T12:55:00Z
6
value 0.06542
scoring_system epss
scoring_elements 0.91128
published_at 2026-04-11T12:55:00Z
7
value 0.06542
scoring_system epss
scoring_elements 0.9113
published_at 2026-04-12T12:55:00Z
8
value 0.06542
scoring_system epss
scoring_elements 0.91129
published_at 2026-04-13T12:55:00Z
9
value 0.06542
scoring_system epss
scoring_elements 0.91153
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0978
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0978
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1236
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1236
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1049165
reference_id 1049165
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1049165
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734745
reference_id 734745
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734745
6
reference_url https://security.gentoo.org/glsa/201702-06
reference_id GLSA-201702-06
reference_type
scores
url https://security.gentoo.org/glsa/201702-06
7
reference_url https://usn.ubuntu.com/2083-1/
reference_id USN-2083-1
reference_type
scores
url https://usn.ubuntu.com/2083-1/
fixed_packages
0
url pkg:deb/debian/graphviz@2.26.3-14%2Bdeb7u2
purl pkg:deb/debian/graphviz@2.26.3-14%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5ufx-caw4-pugf
1
vulnerability VCID-bst1-9mr8-u3ab
2
vulnerability VCID-ftef-9uwy-g3gc
3
vulnerability VCID-gytk-7hp5-hkgt
4
vulnerability VCID-hn88-6rd6-auh3
5
vulnerability VCID-u23g-vzrm-cbh3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphviz@2.26.3-14%252Bdeb7u2
1
url pkg:deb/debian/graphviz@2.38.0-7
purl pkg:deb/debian/graphviz@2.38.0-7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ftef-9uwy-g3gc
1
vulnerability VCID-gytk-7hp5-hkgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphviz@2.38.0-7
aliases CVE-2014-0978
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bst1-9mr8-u3ab
2
url VCID-dpgy-5wh3-pubj
vulnerability_id VCID-dpgy-5wh3-pubj
summary
A buffer overflow in Graphviz might lead to user-assisted execution of
    arbitrary code via a DOT file.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=240636
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=240636
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html
2
reference_url http://roeehay.blogspot.com/2008/10/graphviz-buffer-overflow-code-execution.html
reference_id
reference_type
scores
url http://roeehay.blogspot.com/2008/10/graphviz-buffer-overflow-code-execution.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4555.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4555.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4555
reference_id
reference_type
scores
0
value 0.05229
scoring_system epss
scoring_elements 0.89972
published_at 2026-04-16T12:55:00Z
1
value 0.05229
scoring_system epss
scoring_elements 0.89915
published_at 2026-04-01T12:55:00Z
2
value 0.05229
scoring_system epss
scoring_elements 0.89919
published_at 2026-04-02T12:55:00Z
3
value 0.05229
scoring_system epss
scoring_elements 0.89931
published_at 2026-04-04T12:55:00Z
4
value 0.05229
scoring_system epss
scoring_elements 0.89937
published_at 2026-04-07T12:55:00Z
5
value 0.05229
scoring_system epss
scoring_elements 0.89953
published_at 2026-04-08T12:55:00Z
6
value 0.05229
scoring_system epss
scoring_elements 0.89959
published_at 2026-04-09T12:55:00Z
7
value 0.05229
scoring_system epss
scoring_elements 0.89967
published_at 2026-04-11T12:55:00Z
8
value 0.05229
scoring_system epss
scoring_elements 0.89965
published_at 2026-04-12T12:55:00Z
9
value 0.05229
scoring_system epss
scoring_elements 0.89958
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4555
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4555
6
reference_url http://secunia.com/advisories/32186
reference_id
reference_type
scores
url http://secunia.com/advisories/32186
7
reference_url http://secunia.com/advisories/32656
reference_id
reference_type
scores
url http://secunia.com/advisories/32656
8
reference_url http://security.gentoo.org/glsa/glsa-200811-04.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200811-04.xml
9
reference_url http://securityreason.com/securityalert/4409
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4409
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45765
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45765
11
reference_url http://www.securityfocus.com/archive/1/497150/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/497150/100/0/threaded
12
reference_url http://www.securityfocus.com/bid/31648
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31648
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=466914
reference_id 466914
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=466914
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.14.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.16.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.16.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.16.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5_0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5_0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5_0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.5.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.5.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.8.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.9.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.12:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.14:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.16:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.18:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.20.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.20.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.2.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.2.1.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.2.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.8:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4555
reference_id CVE-2008-4555
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4555
55
reference_url https://security.gentoo.org/glsa/200811-04
reference_id GLSA-200811-04
reference_type
scores
url https://security.gentoo.org/glsa/200811-04
fixed_packages
0
url pkg:deb/debian/graphviz@2.20.2-3
purl pkg:deb/debian/graphviz@2.20.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5ufx-caw4-pugf
1
vulnerability VCID-bst1-9mr8-u3ab
2
vulnerability VCID-ftef-9uwy-g3gc
3
vulnerability VCID-gytk-7hp5-hkgt
4
vulnerability VCID-hn88-6rd6-auh3
5
vulnerability VCID-u23g-vzrm-cbh3
6
vulnerability VCID-xzye-g5rw-fyh5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphviz@2.20.2-3
aliases CVE-2008-4555
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dpgy-5wh3-pubj
3
url VCID-ftef-9uwy-g3gc
vulnerability_id VCID-ftef-9uwy-g3gc
summary graphviz: NULL pointer dereference in rebuild_vlis
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10196.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10196
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.32035
published_at 2026-04-01T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.32072
published_at 2026-04-16T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32108
published_at 2026-04-11T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32069
published_at 2026-04-12T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.32038
published_at 2026-04-13T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32162
published_at 2026-04-02T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32201
published_at 2026-04-04T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.32024
published_at 2026-04-07T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.32075
published_at 2026-04-08T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.32104
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/graphviz/graphviz/issues/1367
reference_id
reference_type
scores
url https://gitlab.com/graphviz/graphviz/issues/1367
5
reference_url https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VR2CT3LD52GWAQUZAOSEXSYE3O7HGN/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TWUEEJPMS5LAROYJYY6FREOTI6VPN3M4/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1579254
reference_id 1579254
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1579254
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898841
reference_id 898841
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898841
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.40.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:2.40.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:2.40.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10196
reference_id CVE-2018-10196
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10196
17
reference_url https://usn.ubuntu.com/5264-1/
reference_id USN-5264-1
reference_type
scores
url https://usn.ubuntu.com/5264-1/
18
reference_url https://usn.ubuntu.com/5971-1/
reference_id USN-5971-1
reference_type
scores
url https://usn.ubuntu.com/5971-1/
fixed_packages
0
url pkg:deb/debian/graphviz@2.40.1-6%2Bdeb10u1
purl pkg:deb/debian/graphviz@2.40.1-6%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gytk-7hp5-hkgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphviz@2.40.1-6%252Bdeb10u1
aliases CVE-2018-10196
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ftef-9uwy-g3gc
4
url VCID-gytk-7hp5-hkgt
vulnerability_id VCID-gytk-7hp5-hkgt
summary
Multiple vulnerabilities have been found in Graphviz, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-18032.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-18032.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-18032
reference_id
reference_type
scores
0
value 0.00434
scoring_system epss
scoring_elements 0.6271
published_at 2026-04-01T12:55:00Z
1
value 0.00434
scoring_system epss
scoring_elements 0.62767
published_at 2026-04-02T12:55:00Z
2
value 0.00434
scoring_system epss
scoring_elements 0.62797
published_at 2026-04-04T12:55:00Z
3
value 0.00434
scoring_system epss
scoring_elements 0.62761
published_at 2026-04-07T12:55:00Z
4
value 0.00434
scoring_system epss
scoring_elements 0.62812
published_at 2026-04-08T12:55:00Z
5
value 0.00434
scoring_system epss
scoring_elements 0.62836
published_at 2026-04-12T12:55:00Z
6
value 0.00434
scoring_system epss
scoring_elements 0.62813
published_at 2026-04-13T12:55:00Z
7
value 0.00434
scoring_system epss
scoring_elements 0.62829
published_at 2026-04-09T12:55:00Z
8
value 0.00434
scoring_system epss
scoring_elements 0.62847
published_at 2026-04-11T12:55:00Z
9
value 0.00471
scoring_system epss
scoring_elements 0.64641
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-18032
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18032
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1966272
reference_id 1966272
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1966272
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988000
reference_id 988000
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988000
6
reference_url https://security.gentoo.org/glsa/202107-04
reference_id GLSA-202107-04
reference_type
scores
url https://security.gentoo.org/glsa/202107-04
7
reference_url https://access.redhat.com/errata/RHSA-2021:4256
reference_id RHSA-2021:4256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4256
8
reference_url https://usn.ubuntu.com/5264-1/
reference_id USN-5264-1
reference_type
scores
url https://usn.ubuntu.com/5264-1/
9
reference_url https://usn.ubuntu.com/5971-1/
reference_id USN-5971-1
reference_type
scores
url https://usn.ubuntu.com/5971-1/
fixed_packages
0
url pkg:deb/debian/graphviz@2.40.1-6%2Bdeb10u1
purl pkg:deb/debian/graphviz@2.40.1-6%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gytk-7hp5-hkgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphviz@2.40.1-6%252Bdeb10u1
1
url pkg:deb/debian/graphviz@2.42.2-5%2Bdeb11u1
purl pkg:deb/debian/graphviz@2.42.2-5%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-c726-budg-fkaf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphviz@2.42.2-5%252Bdeb11u1
aliases CVE-2020-18032
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gytk-7hp5-hkgt
5
url VCID-hn88-6rd6-auh3
vulnerability_id VCID-hn88-6rd6-auh3
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0520.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0520.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9157.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9157.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9157
reference_id
reference_type
scores
0
value 0.01899
scoring_system epss
scoring_elements 0.83263
published_at 2026-04-16T12:55:00Z
1
value 0.01899
scoring_system epss
scoring_elements 0.8316
published_at 2026-04-01T12:55:00Z
2
value 0.01899
scoring_system epss
scoring_elements 0.83177
published_at 2026-04-02T12:55:00Z
3
value 0.01899
scoring_system epss
scoring_elements 0.83191
published_at 2026-04-04T12:55:00Z
4
value 0.01899
scoring_system epss
scoring_elements 0.83189
published_at 2026-04-07T12:55:00Z
5
value 0.01899
scoring_system epss
scoring_elements 0.83214
published_at 2026-04-08T12:55:00Z
6
value 0.01899
scoring_system epss
scoring_elements 0.83221
published_at 2026-04-09T12:55:00Z
7
value 0.01899
scoring_system epss
scoring_elements 0.83236
published_at 2026-04-11T12:55:00Z
8
value 0.01899
scoring_system epss
scoring_elements 0.83231
published_at 2026-04-12T12:55:00Z
9
value 0.01899
scoring_system epss
scoring_elements 0.83226
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9157
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9157
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9157
4
reference_url http://seclists.org/oss-sec/2014/q4/784
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2014/q4/784
5
reference_url http://seclists.org/oss-sec/2014/q4/872
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2014/q4/872
6
reference_url http://secunia.com/advisories/60166
reference_id
reference_type
scores
url http://secunia.com/advisories/60166
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/98949
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/98949
8
reference_url https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe41719081
reference_id
reference_type
scores
url https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe41719081
9
reference_url http://www.debian.org/security/2014/dsa-3098
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3098
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:248
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:248
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:187
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:187
12
reference_url http://www.securityfocus.com/bid/71283
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71283
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1167866
reference_id 1167866
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1167866
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772648
reference_id 772648
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772648
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9157
reference_id CVE-2014-9157
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-9157
19
reference_url https://usn.ubuntu.com/2435-1/
reference_id USN-2435-1
reference_type
scores
url https://usn.ubuntu.com/2435-1/
fixed_packages
0
url pkg:deb/debian/graphviz@2.26.3-14%2Bdeb7u2
purl pkg:deb/debian/graphviz@2.26.3-14%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5ufx-caw4-pugf
1
vulnerability VCID-bst1-9mr8-u3ab
2
vulnerability VCID-ftef-9uwy-g3gc
3
vulnerability VCID-gytk-7hp5-hkgt
4
vulnerability VCID-hn88-6rd6-auh3
5
vulnerability VCID-u23g-vzrm-cbh3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphviz@2.26.3-14%252Bdeb7u2
1
url pkg:deb/debian/graphviz@2.38.0-7
purl pkg:deb/debian/graphviz@2.38.0-7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ftef-9uwy-g3gc
1
vulnerability VCID-gytk-7hp5-hkgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphviz@2.38.0-7
aliases CVE-2014-9157
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hn88-6rd6-auh3
6
url VCID-u23g-vzrm-cbh3
vulnerability_id VCID-u23g-vzrm-cbh3
summary
Multiple vulnerabilities have been found in Graphviz and the extent
    of these vulnerabilities are unspecified.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1235.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1235
reference_id
reference_type
scores
0
value 0.00919
scoring_system epss
scoring_elements 0.75974
published_at 2026-04-11T12:55:00Z
1
value 0.00919
scoring_system epss
scoring_elements 0.75951
published_at 2026-04-12T12:55:00Z
2
value 0.00919
scoring_system epss
scoring_elements 0.75944
published_at 2026-04-13T12:55:00Z
3
value 0.00919
scoring_system epss
scoring_elements 0.75981
published_at 2026-04-16T12:55:00Z
4
value 0.01182
scoring_system epss
scoring_elements 0.78755
published_at 2026-04-08T12:55:00Z
5
value 0.01182
scoring_system epss
scoring_elements 0.78709
published_at 2026-04-01T12:55:00Z
6
value 0.01182
scoring_system epss
scoring_elements 0.78761
published_at 2026-04-09T12:55:00Z
7
value 0.01182
scoring_system epss
scoring_elements 0.78716
published_at 2026-04-02T12:55:00Z
8
value 0.01182
scoring_system epss
scoring_elements 0.78747
published_at 2026-04-04T12:55:00Z
9
value 0.01182
scoring_system epss
scoring_elements 0.78729
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1235
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1050871
reference_id 1050871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1050871
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734745
reference_id 734745
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734745
5
reference_url https://security.gentoo.org/glsa/201702-06
reference_id GLSA-201702-06
reference_type
scores
url https://security.gentoo.org/glsa/201702-06
6
reference_url https://usn.ubuntu.com/2083-1/
reference_id USN-2083-1
reference_type
scores
url https://usn.ubuntu.com/2083-1/
fixed_packages
0
url pkg:deb/debian/graphviz@2.38.0-7
purl pkg:deb/debian/graphviz@2.38.0-7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ftef-9uwy-g3gc
1
vulnerability VCID-gytk-7hp5-hkgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphviz@2.38.0-7
aliases CVE-2014-1235
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u23g-vzrm-cbh3
7
url VCID-xzye-g5rw-fyh5
vulnerability_id VCID-xzye-g5rw-fyh5
summary
Multiple vulnerabilities have been found in GraphicsMagick,
    allowing remote attackers to execute arbitrary code or cause a Denial of
    Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3736.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3736.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3736
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26117
published_at 2026-04-01T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26198
published_at 2026-04-02T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.2624
published_at 2026-04-04T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26012
published_at 2026-04-07T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26078
published_at 2026-04-08T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.2613
published_at 2026-04-09T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26139
published_at 2026-04-11T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31157
published_at 2026-04-12T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.31113
published_at 2026-04-13T12:55:00Z
9
value 0.00121
scoring_system epss
scoring_elements 0.31146
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3736
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=537941
reference_id 537941
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=537941
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559797
reference_id 559797
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559797
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559801
reference_id 559801
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559801
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559806
reference_id 559806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559806
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559809
reference_id 559809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559809
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559811
reference_id 559811
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559811
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559814
reference_id 559814
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559814
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559815
reference_id 559815
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559815
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559816
reference_id 559816
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559816
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559819
reference_id 559819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559819
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559822
reference_id 559822
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559822
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559824
reference_id 559824
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559824
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559825
reference_id 559825
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559825
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559826
reference_id 559826
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559826
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559829
reference_id 559829
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559829
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559831
reference_id 559831
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559831
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559832
reference_id 559832
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559832
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559833
reference_id 559833
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559833
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559834
reference_id 559834
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559834
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559835
reference_id 559835
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559835
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559836
reference_id 559836
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559836
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559837
reference_id 559837
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559837
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559840
reference_id 559840
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559840
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559844
reference_id 559844
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559844
27
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559845
reference_id 559845
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559845
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702436
reference_id 702436
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702436
29
reference_url https://security.gentoo.org/glsa/201311-10
reference_id GLSA-201311-10
reference_type
scores
url https://security.gentoo.org/glsa/201311-10
30
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
31
reference_url https://access.redhat.com/errata/RHSA-2009:1646
reference_id RHSA-2009:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1646
32
reference_url https://access.redhat.com/errata/RHSA-2010:0039
reference_id RHSA-2010:0039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0039
fixed_packages
0
url pkg:deb/debian/graphviz@2.26.3-14%2Bdeb7u2
purl pkg:deb/debian/graphviz@2.26.3-14%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5ufx-caw4-pugf
1
vulnerability VCID-bst1-9mr8-u3ab
2
vulnerability VCID-ftef-9uwy-g3gc
3
vulnerability VCID-gytk-7hp5-hkgt
4
vulnerability VCID-hn88-6rd6-auh3
5
vulnerability VCID-u23g-vzrm-cbh3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphviz@2.26.3-14%252Bdeb7u2
aliases CVE-2009-3736
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xzye-g5rw-fyh5
Fixing_vulnerabilities
0
url VCID-j9yn-735h-mqds
vulnerability_id VCID-j9yn-735h-mqds
summary graphviz before 2.2.1 allows local users to overwrite arbitrary files via a symlink attack on temporary files. NOTE: this issue was originally associated with a different CVE identifier, CVE-2005-2965, which had been used for multiple different issues. This is the correct identifier.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-4803
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19698
published_at 2026-04-16T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19763
published_at 2026-04-01T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19908
published_at 2026-04-02T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19964
published_at 2026-04-04T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19691
published_at 2026-04-07T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.1977
published_at 2026-04-08T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19822
published_at 2026-04-09T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19825
published_at 2026-04-11T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.1978
published_at 2026-04-12T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19723
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-4803
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4803
2
reference_url http://secunia.com/advisories/17121
reference_id
reference_type
scores
url http://secunia.com/advisories/17121
3
reference_url http://secunia.com/advisories/17125
reference_id
reference_type
scores
url http://secunia.com/advisories/17125
4
reference_url http://secunia.com/advisories/17207
reference_id
reference_type
scores
url http://secunia.com/advisories/17207
5
reference_url http://www.debian.org/security/2005/dsa-857
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-857
6
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:188
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:188
7
reference_url http://www.securityfocus.com/bid/15050
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15050
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=336985
reference_id 336985
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=336985
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.14.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.16.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.16.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.16.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5_0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5_0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5_0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.5:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.7.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.5.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.5.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphviz:graphviz:1.8.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.9.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-4803
reference_id CVE-2005-4803
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-4803
fixed_packages
0
url pkg:deb/debian/graphviz@2.2.1-1sarge1
purl pkg:deb/debian/graphviz@2.2.1-1sarge1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5ufx-caw4-pugf
1
vulnerability VCID-bst1-9mr8-u3ab
2
vulnerability VCID-dpgy-5wh3-pubj
3
vulnerability VCID-ftef-9uwy-g3gc
4
vulnerability VCID-gytk-7hp5-hkgt
5
vulnerability VCID-hn88-6rd6-auh3
6
vulnerability VCID-u23g-vzrm-cbh3
7
vulnerability VCID-xzye-g5rw-fyh5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphviz@2.2.1-1sarge1
aliases CVE-2005-4803
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9yn-735h-mqds
Risk_score3.9
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/graphviz@2.2.1-1sarge1