Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/graphicsmagick@1.3.26-r5?arch=armv7&distroversion=v3.22&reponame=community
Typeapk
Namespacealpine
Namegraphicsmagick
Version1.3.26-r5
Qualifiers
arch armv7
distroversion v3.22
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.3.27-r0
Latest_non_vulnerable_version1.3.38-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1hfa-9cbc-yfch
vulnerability_id VCID-1hfa-9cbc-yfch
summary The ReadJNGImage and ReadOneJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 do not properly manage image pointers after certain error conditions, which allows remote attackers to conduct use-after-free attacks via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-11403.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14103
reference_id
reference_type
scores
0
value 0.019
scoring_system epss
scoring_elements 0.83265
published_at 2026-04-16T12:55:00Z
1
value 0.019
scoring_system epss
scoring_elements 0.83229
published_at 2026-04-13T12:55:00Z
2
value 0.019
scoring_system epss
scoring_elements 0.83163
published_at 2026-04-01T12:55:00Z
3
value 0.019
scoring_system epss
scoring_elements 0.8318
published_at 2026-04-02T12:55:00Z
4
value 0.019
scoring_system epss
scoring_elements 0.83193
published_at 2026-04-04T12:55:00Z
5
value 0.019
scoring_system epss
scoring_elements 0.83192
published_at 2026-04-07T12:55:00Z
6
value 0.019
scoring_system epss
scoring_elements 0.83216
published_at 2026-04-08T12:55:00Z
7
value 0.019
scoring_system epss
scoring_elements 0.83223
published_at 2026-04-09T12:55:00Z
8
value 0.019
scoring_system epss
scoring_elements 0.83239
published_at 2026-04-11T12:55:00Z
9
value 0.019
scoring_system epss
scoring_elements 0.83234
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14103
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14103
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/graphicsmagick@1.3.26-r5?arch=armv7&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/graphicsmagick@1.3.26-r5?arch=armv7&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.26-r5%3Farch=armv7&distroversion=v3.22&reponame=community
aliases CVE-2017-14103
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1hfa-9cbc-yfch
1
url VCID-5ejx-vfmd-7fh8
vulnerability_id VCID-5ejx-vfmd-7fh8
summary In GraphicsMagick 1.3.26, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13648
reference_id
reference_type
scores
0
value 0.00429
scoring_system epss
scoring_elements 0.6252
published_at 2026-04-16T12:55:00Z
1
value 0.00429
scoring_system epss
scoring_elements 0.62478
published_at 2026-04-13T12:55:00Z
2
value 0.00429
scoring_system epss
scoring_elements 0.62369
published_at 2026-04-01T12:55:00Z
3
value 0.00429
scoring_system epss
scoring_elements 0.62428
published_at 2026-04-02T12:55:00Z
4
value 0.00429
scoring_system epss
scoring_elements 0.62458
published_at 2026-04-04T12:55:00Z
5
value 0.00429
scoring_system epss
scoring_elements 0.62425
published_at 2026-04-07T12:55:00Z
6
value 0.00429
scoring_system epss
scoring_elements 0.62476
published_at 2026-04-08T12:55:00Z
7
value 0.00429
scoring_system epss
scoring_elements 0.62492
published_at 2026-04-09T12:55:00Z
8
value 0.00429
scoring_system epss
scoring_elements 0.62511
published_at 2026-04-11T12:55:00Z
9
value 0.00429
scoring_system epss
scoring_elements 0.625
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13648
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13648
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/graphicsmagick@1.3.26-r5?arch=armv7&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/graphicsmagick@1.3.26-r5?arch=armv7&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.26-r5%3Farch=armv7&distroversion=v3.22&reponame=community
aliases CVE-2017-13648
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ejx-vfmd-7fh8
2
url VCID-7fjy-7tv8-wqca
vulnerability_id VCID-7fjy-7tv8-wqca
summary A memory allocation failure was discovered in the ReadPNMImage function in coders/pnm.c in GraphicsMagick 1.3.26. The vulnerability causes a big memory allocation, which may lead to remote denial of service in the MagickRealloc function in magick/memory.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14042
reference_id
reference_type
scores
0
value 0.00431
scoring_system epss
scoring_elements 0.62659
published_at 2026-04-16T12:55:00Z
1
value 0.00431
scoring_system epss
scoring_elements 0.62617
published_at 2026-04-13T12:55:00Z
2
value 0.00431
scoring_system epss
scoring_elements 0.62633
published_at 2026-04-09T12:55:00Z
3
value 0.00431
scoring_system epss
scoring_elements 0.62652
published_at 2026-04-11T12:55:00Z
4
value 0.00431
scoring_system epss
scoring_elements 0.6264
published_at 2026-04-12T12:55:00Z
5
value 0.00711
scoring_system epss
scoring_elements 0.72251
published_at 2026-04-08T12:55:00Z
6
value 0.00711
scoring_system epss
scoring_elements 0.72219
published_at 2026-04-02T12:55:00Z
7
value 0.00711
scoring_system epss
scoring_elements 0.72238
published_at 2026-04-04T12:55:00Z
8
value 0.00711
scoring_system epss
scoring_elements 0.72214
published_at 2026-04-07T12:55:00Z
9
value 0.00711
scoring_system epss
scoring_elements 0.72213
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14042
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14042
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873538
reference_id 873538
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873538
4
reference_url https://usn.ubuntu.com/4206-1/
reference_id USN-4206-1
reference_type
scores
url https://usn.ubuntu.com/4206-1/
fixed_packages
0
url pkg:apk/alpine/graphicsmagick@1.3.26-r5?arch=armv7&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/graphicsmagick@1.3.26-r5?arch=armv7&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.26-r5%3Farch=armv7&distroversion=v3.22&reponame=community
aliases CVE-2017-14042
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7fjy-7tv8-wqca
3
url VCID-8v9a-4t7e-9qax
vulnerability_id VCID-8v9a-4t7e-9qax
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13065
reference_id
reference_type
scores
0
value 0.01287
scoring_system epss
scoring_elements 0.79666
published_at 2026-04-16T12:55:00Z
1
value 0.01287
scoring_system epss
scoring_elements 0.79642
published_at 2026-04-12T12:55:00Z
2
value 0.01287
scoring_system epss
scoring_elements 0.79635
published_at 2026-04-13T12:55:00Z
3
value 0.01287
scoring_system epss
scoring_elements 0.79585
published_at 2026-04-01T12:55:00Z
4
value 0.01287
scoring_system epss
scoring_elements 0.79592
published_at 2026-04-02T12:55:00Z
5
value 0.01287
scoring_system epss
scoring_elements 0.79614
published_at 2026-04-04T12:55:00Z
6
value 0.01287
scoring_system epss
scoring_elements 0.79601
published_at 2026-04-07T12:55:00Z
7
value 0.01287
scoring_system epss
scoring_elements 0.7963
published_at 2026-04-08T12:55:00Z
8
value 0.01287
scoring_system epss
scoring_elements 0.79637
published_at 2026-04-09T12:55:00Z
9
value 0.01287
scoring_system epss
scoring_elements 0.79658
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13065
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873119
reference_id 873119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873119
59
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
60
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
61
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:apk/alpine/graphicsmagick@1.3.26-r5?arch=armv7&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/graphicsmagick@1.3.26-r5?arch=armv7&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.26-r5%3Farch=armv7&distroversion=v3.22&reponame=community
aliases CVE-2017-13065
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8v9a-4t7e-9qax
4
url VCID-s3a1-5mc6-rkd9
vulnerability_id VCID-s3a1-5mc6-rkd9
summary The ReadSUNImage function in coders/sun.c in GraphicsMagick 1.3.26 has an issue where memory allocation is excessive because it depends only on a length field in a header. This may lead to remote denial of service in the MagickMalloc function in magick/memory.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14165
reference_id
reference_type
scores
0
value 0.00642
scoring_system epss
scoring_elements 0.70658
published_at 2026-04-16T12:55:00Z
1
value 0.00642
scoring_system epss
scoring_elements 0.70627
published_at 2026-04-12T12:55:00Z
2
value 0.00642
scoring_system epss
scoring_elements 0.70613
published_at 2026-04-13T12:55:00Z
3
value 0.00642
scoring_system epss
scoring_elements 0.7055
published_at 2026-04-01T12:55:00Z
4
value 0.00642
scoring_system epss
scoring_elements 0.70564
published_at 2026-04-02T12:55:00Z
5
value 0.00642
scoring_system epss
scoring_elements 0.70581
published_at 2026-04-04T12:55:00Z
6
value 0.00642
scoring_system epss
scoring_elements 0.70558
published_at 2026-04-07T12:55:00Z
7
value 0.00642
scoring_system epss
scoring_elements 0.70604
published_at 2026-04-08T12:55:00Z
8
value 0.00642
scoring_system epss
scoring_elements 0.70619
published_at 2026-04-09T12:55:00Z
9
value 0.00642
scoring_system epss
scoring_elements 0.70642
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14165
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14165
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874724
reference_id 874724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874724
4
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
5
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
6
reference_url https://usn.ubuntu.com/4232-1/
reference_id USN-4232-1
reference_type
scores
url https://usn.ubuntu.com/4232-1/
fixed_packages
0
url pkg:apk/alpine/graphicsmagick@1.3.26-r5?arch=armv7&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/graphicsmagick@1.3.26-r5?arch=armv7&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.26-r5%3Farch=armv7&distroversion=v3.22&reponame=community
aliases CVE-2017-14165
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3a1-5mc6-rkd9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.26-r5%3Farch=armv7&distroversion=v3.22&reponame=community