Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/graphicsmagick@1.3.26-9?distro=trixie
Typedeb
Namespacedebian
Namegraphicsmagick
Version1.3.26-9
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.3.26-10
Latest_non_vulnerable_version1.4+really1.3.46-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-7fjy-7tv8-wqca
vulnerability_id VCID-7fjy-7tv8-wqca
summary A memory allocation failure was discovered in the ReadPNMImage function in coders/pnm.c in GraphicsMagick 1.3.26. The vulnerability causes a big memory allocation, which may lead to remote denial of service in the MagickRealloc function in magick/memory.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14042
reference_id
reference_type
scores
0
value 0.00431
scoring_system epss
scoring_elements 0.62647
published_at 2026-04-21T12:55:00Z
1
value 0.00431
scoring_system epss
scoring_elements 0.62633
published_at 2026-04-09T12:55:00Z
2
value 0.00431
scoring_system epss
scoring_elements 0.62652
published_at 2026-04-11T12:55:00Z
3
value 0.00431
scoring_system epss
scoring_elements 0.6264
published_at 2026-04-12T12:55:00Z
4
value 0.00431
scoring_system epss
scoring_elements 0.62617
published_at 2026-04-13T12:55:00Z
5
value 0.00431
scoring_system epss
scoring_elements 0.62659
published_at 2026-04-16T12:55:00Z
6
value 0.00431
scoring_system epss
scoring_elements 0.62666
published_at 2026-04-18T12:55:00Z
7
value 0.00711
scoring_system epss
scoring_elements 0.72219
published_at 2026-04-02T12:55:00Z
8
value 0.00711
scoring_system epss
scoring_elements 0.72214
published_at 2026-04-07T12:55:00Z
9
value 0.00711
scoring_system epss
scoring_elements 0.72251
published_at 2026-04-08T12:55:00Z
10
value 0.00711
scoring_system epss
scoring_elements 0.72213
published_at 2026-04-01T12:55:00Z
11
value 0.00711
scoring_system epss
scoring_elements 0.72238
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14042
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14042
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873538
reference_id 873538
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873538
4
reference_url https://usn.ubuntu.com/4206-1/
reference_id USN-4206-1
reference_type
scores
url https://usn.ubuntu.com/4206-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-9?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-9%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-14042
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7fjy-7tv8-wqca
1
url VCID-s3a1-5mc6-rkd9
vulnerability_id VCID-s3a1-5mc6-rkd9
summary The ReadSUNImage function in coders/sun.c in GraphicsMagick 1.3.26 has an issue where memory allocation is excessive because it depends only on a length field in a header. This may lead to remote denial of service in the MagickMalloc function in magick/memory.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14165
reference_id
reference_type
scores
0
value 0.00642
scoring_system epss
scoring_elements 0.70645
published_at 2026-04-21T12:55:00Z
1
value 0.00642
scoring_system epss
scoring_elements 0.70658
published_at 2026-04-16T12:55:00Z
2
value 0.00642
scoring_system epss
scoring_elements 0.70666
published_at 2026-04-18T12:55:00Z
3
value 0.00642
scoring_system epss
scoring_elements 0.7055
published_at 2026-04-01T12:55:00Z
4
value 0.00642
scoring_system epss
scoring_elements 0.70564
published_at 2026-04-02T12:55:00Z
5
value 0.00642
scoring_system epss
scoring_elements 0.70581
published_at 2026-04-04T12:55:00Z
6
value 0.00642
scoring_system epss
scoring_elements 0.70558
published_at 2026-04-07T12:55:00Z
7
value 0.00642
scoring_system epss
scoring_elements 0.70604
published_at 2026-04-08T12:55:00Z
8
value 0.00642
scoring_system epss
scoring_elements 0.70619
published_at 2026-04-09T12:55:00Z
9
value 0.00642
scoring_system epss
scoring_elements 0.70642
published_at 2026-04-11T12:55:00Z
10
value 0.00642
scoring_system epss
scoring_elements 0.70627
published_at 2026-04-12T12:55:00Z
11
value 0.00642
scoring_system epss
scoring_elements 0.70613
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14165
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14165
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874724
reference_id 874724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874724
4
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
5
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
6
reference_url https://usn.ubuntu.com/4232-1/
reference_id USN-4232-1
reference_type
scores
url https://usn.ubuntu.com/4232-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-9?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-9%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-14165
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3a1-5mc6-rkd9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-9%3Fdistro=trixie