{"url":"http://public2.vulnerablecode.io/api/packages/924328?format=json","purl":"pkg:deb/debian/graphicsmagick@1.3.25-1?distro=trixie","type":"deb","namespace":"debian","name":"graphicsmagick","version":"1.3.25-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.3.25-3","latest_non_vulnerable_version":"1.4+really1.3.46-2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92962?format=json","vulnerability_id":"VCID-12mr-p56j-mbg2","summary":"Buffer overflow in the MVG and SVG rendering code in GraphicsMagick 1.3.24 allows remote attackers to have unspecified impact via unknown vectors. Note: This vulnerability exists due to an incomplete patch for CVE-2016-2317.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7446","reference_id":"","reference_type":"","scores":[{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.87056","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.86861","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.86871","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.8689","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.86885","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.86905","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.86913","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.86925","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.86921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.86916","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.86932","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.86937","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.86936","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.86954","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.8696","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.86962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.86983","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.87","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.87018","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.87013","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03159","scoring_system":"epss","scoring_elements":"0.87027","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7446"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7446","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7446"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924328?format=json","purl":"pkg:deb/debian/graphicsmagick@1.3.25-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924306?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924304?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924308?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924307?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie"}],"aliases":["CVE-2016-7446"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-12mr-p56j-mbg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92964?format=json","vulnerability_id":"VCID-mqgj-96wb-3ka2","summary":"The Utah RLE reader in GraphicsMagick before 1.3.25 allows remote attackers to cause a denial of service (CPU consumption or large memory allocations) via vectors involving the header information and the file size.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7448","reference_id":"","reference_type":"","scores":[{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88754","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.886","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88609","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88625","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88646","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.8865","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88655","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88668","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88678","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88683","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88682","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88693","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88709","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88722","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88719","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.8873","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7448"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924328?format=json","purl":"pkg:deb/debian/graphicsmagick@1.3.25-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924306?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924304?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924308?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924307?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie"}],"aliases":["CVE-2016-7448"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mqgj-96wb-3ka2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92965?format=json","vulnerability_id":"VCID-n7z7-zq3w-57cf","summary":"The TIFFGetField function in coders/tiff.c in GraphicsMagick 1.3.24 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a file containing an \"unterminated\" string.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7449","reference_id":"","reference_type":"","scores":[{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87279","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87084","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87112","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87126","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87133","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87146","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87136","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87157","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87153","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87172","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87178","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87199","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87215","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87234","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87229","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87244","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7449","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7449"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924328?format=json","purl":"pkg:deb/debian/graphicsmagick@1.3.25-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924306?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924304?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924308?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924307?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie"}],"aliases":["CVE-2016-7449"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7z7-zq3w-57cf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92963?format=json","vulnerability_id":"VCID-rj8k-p2xg-6fcs","summary":"Heap-based buffer overflow in the EscapeParenthesis function in GraphicsMagick before 1.3.25 allows remote attackers to have unspecified impact via unknown vectors.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7447","reference_id":"","reference_type":"","scores":[{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83944","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83695","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83726","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83749","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83772","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83795","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83822","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.8383","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83834","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83857","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83878","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83894","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.8391","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7447"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7447","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7447"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924328?format=json","purl":"pkg:deb/debian/graphicsmagick@1.3.25-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924306?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924304?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924308?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924307?format=json","purl":"pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie"}],"aliases":["CVE-2016-7447"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rj8k-p2xg-6fcs"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-1%3Fdistro=trixie"}