Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libmspack@0.5-1?distro=trixie
Typedeb
Namespacedebian
Namelibmspack
Version0.5-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version0.6-1
Latest_non_vulnerable_version0.11-1.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6mc3-fgw8-5qby
vulnerability_id VCID-6mc3-fgw8-5qby
summary
Multiple vulnerabilities have been found in Adobe Flash Player, the
    worst of which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4472
reference_id
reference_type
scores
0
value 0.00365
scoring_system epss
scoring_elements 0.58413
published_at 2026-04-01T12:55:00Z
1
value 0.00365
scoring_system epss
scoring_elements 0.58498
published_at 2026-04-02T12:55:00Z
2
value 0.00365
scoring_system epss
scoring_elements 0.58518
published_at 2026-04-04T12:55:00Z
3
value 0.00365
scoring_system epss
scoring_elements 0.58489
published_at 2026-04-07T12:55:00Z
4
value 0.00365
scoring_system epss
scoring_elements 0.58541
published_at 2026-04-21T12:55:00Z
5
value 0.00365
scoring_system epss
scoring_elements 0.58548
published_at 2026-04-09T12:55:00Z
6
value 0.00365
scoring_system epss
scoring_elements 0.58564
published_at 2026-04-11T12:55:00Z
7
value 0.00365
scoring_system epss
scoring_elements 0.58545
published_at 2026-04-12T12:55:00Z
8
value 0.00365
scoring_system epss
scoring_elements 0.58525
published_at 2026-04-13T12:55:00Z
9
value 0.00365
scoring_system epss
scoring_elements 0.58558
published_at 2026-04-16T12:55:00Z
10
value 0.00365
scoring_system epss
scoring_elements 0.58563
published_at 2026-04-18T12:55:00Z
11
value 0.00365
scoring_system epss
scoring_elements 0.58509
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4472
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4472
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775687
reference_id 775687
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775687
3
reference_url https://security.gentoo.org/glsa/201506-01
reference_id GLSA-201506-01
reference_type
scores
url https://security.gentoo.org/glsa/201506-01
4
reference_url https://usn.ubuntu.com/7788-1/
reference_id USN-7788-1
reference_type
scores
url https://usn.ubuntu.com/7788-1/
fixed_packages
0
url pkg:deb/debian/libmspack@0.5-1?distro=trixie
purl pkg:deb/debian/libmspack@0.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.5-1%3Fdistro=trixie
1
url pkg:deb/debian/libmspack@0.10.1-2?distro=trixie
purl pkg:deb/debian/libmspack@0.10.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.10.1-2%3Fdistro=trixie
2
url pkg:deb/debian/libmspack@0.11-1?distro=trixie
purl pkg:deb/debian/libmspack@0.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.11-1%3Fdistro=trixie
3
url pkg:deb/debian/libmspack@0.11-1.1?distro=trixie
purl pkg:deb/debian/libmspack@0.11-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.11-1.1%3Fdistro=trixie
aliases CVE-2015-4472
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6mc3-fgw8-5qby
1
url VCID-76q9-uw9b-a7fa
vulnerability_id VCID-76q9-uw9b-a7fa
summary The cabd_extract function in cabd.c in libmspack before 0.5 does not properly maintain decompression callbacks in certain cases where an invalid file follows a valid file, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted CAB archive.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9732
reference_id
reference_type
scores
0
value 0.004
scoring_system epss
scoring_elements 0.60588
published_at 2026-04-01T12:55:00Z
1
value 0.004
scoring_system epss
scoring_elements 0.60663
published_at 2026-04-02T12:55:00Z
2
value 0.004
scoring_system epss
scoring_elements 0.60692
published_at 2026-04-04T12:55:00Z
3
value 0.004
scoring_system epss
scoring_elements 0.60661
published_at 2026-04-07T12:55:00Z
4
value 0.004
scoring_system epss
scoring_elements 0.60709
published_at 2026-04-08T12:55:00Z
5
value 0.004
scoring_system epss
scoring_elements 0.60725
published_at 2026-04-09T12:55:00Z
6
value 0.004
scoring_system epss
scoring_elements 0.6075
published_at 2026-04-21T12:55:00Z
7
value 0.004
scoring_system epss
scoring_elements 0.60737
published_at 2026-04-12T12:55:00Z
8
value 0.004
scoring_system epss
scoring_elements 0.60717
published_at 2026-04-13T12:55:00Z
9
value 0.004
scoring_system epss
scoring_elements 0.60761
published_at 2026-04-16T12:55:00Z
10
value 0.004
scoring_system epss
scoring_elements 0.60765
published_at 2026-04-18T12:55:00Z
11
value 0.004
scoring_system epss
scoring_elements 0.60738
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9732
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9732
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774665
reference_id 774665
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774665
fixed_packages
0
url pkg:deb/debian/libmspack@0.5-1?distro=trixie
purl pkg:deb/debian/libmspack@0.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.5-1%3Fdistro=trixie
1
url pkg:deb/debian/libmspack@0.10.1-2?distro=trixie
purl pkg:deb/debian/libmspack@0.10.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.10.1-2%3Fdistro=trixie
2
url pkg:deb/debian/libmspack@0.11-1?distro=trixie
purl pkg:deb/debian/libmspack@0.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.11-1%3Fdistro=trixie
3
url pkg:deb/debian/libmspack@0.11-1.1?distro=trixie
purl pkg:deb/debian/libmspack@0.11-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.11-1.1%3Fdistro=trixie
aliases CVE-2014-9732
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-76q9-uw9b-a7fa
2
url VCID-aa1x-d19y-sqgg
vulnerability_id VCID-aa1x-d19y-sqgg
summary Off-by-one error in the inflate function in mszipd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CAB archive.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4470
reference_id
reference_type
scores
0
value 0.00425
scoring_system epss
scoring_elements 0.62119
published_at 2026-04-01T12:55:00Z
1
value 0.00425
scoring_system epss
scoring_elements 0.6218
published_at 2026-04-02T12:55:00Z
2
value 0.00425
scoring_system epss
scoring_elements 0.6221
published_at 2026-04-04T12:55:00Z
3
value 0.00425
scoring_system epss
scoring_elements 0.62178
published_at 2026-04-07T12:55:00Z
4
value 0.00425
scoring_system epss
scoring_elements 0.62228
published_at 2026-04-08T12:55:00Z
5
value 0.00425
scoring_system epss
scoring_elements 0.62245
published_at 2026-04-09T12:55:00Z
6
value 0.00425
scoring_system epss
scoring_elements 0.62263
published_at 2026-04-11T12:55:00Z
7
value 0.00425
scoring_system epss
scoring_elements 0.62253
published_at 2026-04-12T12:55:00Z
8
value 0.00425
scoring_system epss
scoring_elements 0.62231
published_at 2026-04-13T12:55:00Z
9
value 0.00425
scoring_system epss
scoring_elements 0.62276
published_at 2026-04-16T12:55:00Z
10
value 0.00425
scoring_system epss
scoring_elements 0.62283
published_at 2026-04-18T12:55:00Z
11
value 0.00425
scoring_system epss
scoring_elements 0.62268
published_at 2026-04-21T12:55:00Z
12
value 0.00425
scoring_system epss
scoring_elements 0.62277
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4470
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4470
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775498
reference_id 775498
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775498
fixed_packages
0
url pkg:deb/debian/libmspack@0.5-1?distro=trixie
purl pkg:deb/debian/libmspack@0.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.5-1%3Fdistro=trixie
1
url pkg:deb/debian/libmspack@0.10.1-2?distro=trixie
purl pkg:deb/debian/libmspack@0.10.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.10.1-2%3Fdistro=trixie
2
url pkg:deb/debian/libmspack@0.11-1?distro=trixie
purl pkg:deb/debian/libmspack@0.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.11-1%3Fdistro=trixie
3
url pkg:deb/debian/libmspack@0.11-1.1?distro=trixie
purl pkg:deb/debian/libmspack@0.11-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.11-1.1%3Fdistro=trixie
aliases CVE-2015-4470
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aa1x-d19y-sqgg
3
url VCID-km35-kh9p-xffn
vulnerability_id VCID-km35-kh9p-xffn
summary Off-by-one error in the lzxd_decompress function in lzxd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (buffer under-read and application crash) via a crafted CAB archive.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4471
reference_id
reference_type
scores
0
value 0.00584
scoring_system epss
scoring_elements 0.68946
published_at 2026-04-01T12:55:00Z
1
value 0.00584
scoring_system epss
scoring_elements 0.68964
published_at 2026-04-02T12:55:00Z
2
value 0.00584
scoring_system epss
scoring_elements 0.68984
published_at 2026-04-04T12:55:00Z
3
value 0.00584
scoring_system epss
scoring_elements 0.68963
published_at 2026-04-07T12:55:00Z
4
value 0.00584
scoring_system epss
scoring_elements 0.69013
published_at 2026-04-08T12:55:00Z
5
value 0.00584
scoring_system epss
scoring_elements 0.69033
published_at 2026-04-09T12:55:00Z
6
value 0.00584
scoring_system epss
scoring_elements 0.69055
published_at 2026-04-11T12:55:00Z
7
value 0.00584
scoring_system epss
scoring_elements 0.6904
published_at 2026-04-21T12:55:00Z
8
value 0.00584
scoring_system epss
scoring_elements 0.69011
published_at 2026-04-13T12:55:00Z
9
value 0.00584
scoring_system epss
scoring_elements 0.69051
published_at 2026-04-16T12:55:00Z
10
value 0.00584
scoring_system epss
scoring_elements 0.6906
published_at 2026-04-18T12:55:00Z
11
value 0.00584
scoring_system epss
scoring_elements 0.69091
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4471
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4471
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775499
reference_id 775499
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775499
fixed_packages
0
url pkg:deb/debian/libmspack@0.5-1?distro=trixie
purl pkg:deb/debian/libmspack@0.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.5-1%3Fdistro=trixie
1
url pkg:deb/debian/libmspack@0.10.1-2?distro=trixie
purl pkg:deb/debian/libmspack@0.10.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.10.1-2%3Fdistro=trixie
2
url pkg:deb/debian/libmspack@0.11-1?distro=trixie
purl pkg:deb/debian/libmspack@0.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.11-1%3Fdistro=trixie
3
url pkg:deb/debian/libmspack@0.11-1.1?distro=trixie
purl pkg:deb/debian/libmspack@0.11-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.11-1.1%3Fdistro=trixie
aliases CVE-2015-4471
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-km35-kh9p-xffn
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libmspack@0.5-1%3Fdistro=trixie