Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1067886?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1067886?format=api", "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0", "type": "nuget", "namespace": "", "name": "Magick.NET-Q16-HDRI-OpenMP-x64", "version": "14.12.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/351993?format=api", "vulnerability_id": "VCID-4zrw-tv4p-6fg3", "summary": "ImageMagick has a heap-buffer-overflow in FTXT encoder\nThe FTXT encoder lacks a boundary check when parsing `ftxt:format`, resulting in an out of bounds read.\n\n```\n==3040863==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x5020000085b2 at pc 0x606c1ee0c6ce bp 0x7ffee30d6150 sp 0x7ffee30d6148\nREAD of size 1 at 0x5020000085b2 thread T0\n```", "references": [ { "reference_url": "https://github.com/ImageMagick/ImageMagick", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ImageMagick/ImageMagick" }, { "reference_url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-w54j-7wpm-crhj", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-w54j-7wpm-crhj" }, { "reference_url": "https://github.com/advisories/GHSA-w54j-7wpm-crhj", "reference_id": "GHSA-w54j-7wpm-crhj", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-w54j-7wpm-crhj" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1067886?format=api", "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066970?format=api", "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.20.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.20.0" } ], "aliases": [ "GHSA-w54j-7wpm-crhj" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4zrw-tv4p-6fg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/352075?format=api", "vulnerability_id": "VCID-57jr-g62b-tbd3", "summary": "ImageMagick has a memory leak in PNG encoder when writing a MNG image\nWhen the PNG encoder fails to write an MNG image it can leak memory.", "references": [ { "reference_url": "https://github.com/ImageMagick/ImageMagick", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ImageMagick/ImageMagick" }, { "reference_url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-x928-4434-crqj", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-x928-4434-crqj" }, { "reference_url": "https://github.com/advisories/GHSA-x928-4434-crqj", "reference_id": "GHSA-x928-4434-crqj", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-x928-4434-crqj" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1067886?format=api", "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066970?format=api", "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.20.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.20.0" } ], "aliases": [ "GHSA-x928-4434-crqj" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-57jr-g62b-tbd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/352044?format=api", "vulnerability_id": "VCID-ayjc-27p7-xkfs", "summary": "ImageMagick has has a stack-buffer-overflow in MNG encoder with oversized pallete\nThe patch for GHSA-7h7q-j33q-hvpf was incomplete and still allows a stack buffer overflow for the multi frame images.", "references": [ { "reference_url": "https://github.com/ImageMagick/ImageMagick", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ImageMagick/ImageMagick" }, { "reference_url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-98cp-rj9f-6v5g", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-98cp-rj9f-6v5g" }, { "reference_url": "https://github.com/advisories/GHSA-98cp-rj9f-6v5g", "reference_id": "GHSA-98cp-rj9f-6v5g", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-98cp-rj9f-6v5g" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1067886?format=api", "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066970?format=api", "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.20.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.20.0" } ], "aliases": [ "GHSA-98cp-rj9f-6v5g" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ayjc-27p7-xkfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/352039?format=api", "vulnerability_id": "VCID-bkhu-mtsz-wubs", "summary": "ImageMagick has a heap buffer overflow read in magnify operation via unrecognized magnify:method value\nAn unrecognized magnify:method will result in an out of bounds read in the magnify operation.\n\n```\n==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61a000000b30\nREAD of size 4 at 0x61a000000b30 thread T0\n```", "references": [ { "reference_url": "https://github.com/ImageMagick/ImageMagick", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ImageMagick/ImageMagick" }, { "reference_url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-8vfj-q2cp-5m5j", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-8vfj-q2cp-5m5j" }, { "reference_url": "https://github.com/advisories/GHSA-8vfj-q2cp-5m5j", "reference_id": "GHSA-8vfj-q2cp-5m5j", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-8vfj-q2cp-5m5j" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1067886?format=api", "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066970?format=api", "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.20.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.20.0" } ], "aliases": [ "GHSA-8vfj-q2cp-5m5j" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bkhu-mtsz-wubs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/352076?format=api", "vulnerability_id": "VCID-es84-ey86-wkfp", "summary": "ImageMagick has has an off-by-one origin validation in allows out-of-bounds read in morphology processing\nAn incorrect morphology would allow an out of bounds read of a single pixel.\n\n```\n==1200284==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x5100000002d0 at pc 0x59e28e60c27a bp 0x7fff047fd8e0 sp 0x7fff047fd8d0\nREAD of size 4 at 0x5100000002d0 thread T0\n```", "references": [ { "reference_url": "https://github.com/ImageMagick/ImageMagick", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ImageMagick/ImageMagick" }, { "reference_url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-q8h3-jv9v-57qx", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-q8h3-jv9v-57qx" }, { "reference_url": "https://github.com/advisories/GHSA-q8h3-jv9v-57qx", "reference_id": "GHSA-q8h3-jv9v-57qx", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-q8h3-jv9v-57qx" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1067886?format=api", "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066970?format=api", "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.20.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.20.0" } ], "aliases": [ "GHSA-q8h3-jv9v-57qx" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-es84-ey86-wkfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/352061?format=api", "vulnerability_id": "VCID-zdnb-14uw-xucc", "summary": "ImageMagick has out-of-bounds access in ConnectedComponentsImage() via CLI-controlled connected-components:* artifacts\nWhen the `connected-components:*` define specifies an invalid index and out of bound operation will result in an access violation.", "references": [ { "reference_url": "https://github.com/ImageMagick/ImageMagick", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ImageMagick/ImageMagick" }, { "reference_url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-pmpg-6pww-fg6q", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-pmpg-6pww-fg6q" }, { "reference_url": "https://github.com/advisories/GHSA-pmpg-6pww-fg6q", "reference_id": "GHSA-pmpg-6pww-fg6q", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-pmpg-6pww-fg6q" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1067886?format=api", "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066970?format=api", "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.20.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.20.0" } ], "aliases": [ "GHSA-pmpg-6pww-fg6q" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zdnb-14uw-xucc" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0" }