{"url":"http://public2.vulnerablecode.io/api/packages/931780?format=json","purl":"pkg:deb/debian/netsurf@3.2%2Bdfsg-3?distro=trixie","type":"deb","namespace":"debian","name":"netsurf","version":"3.2+dfsg-3","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"3.6-1","latest_non_vulnerable_version":"3.11-3","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92760?format=json","vulnerability_id":"VCID-du81-6y36-tucd","summary":"The gif_next_LZW function in libnsgif.c in Libnsgif 0.1.2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted LZW stream in a GIF file.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7506","reference_id":"","reference_type":"","scores":[{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62801","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62816","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62769","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63001","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63004","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62882","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63021","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63028","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63007","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62982","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62941","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.6297","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62934","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7506"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810491","reference_id":"810491","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810491"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931780?format=json","purl":"pkg:deb/debian/netsurf@3.2%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.2%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931775?format=json","purl":"pkg:deb/debian/netsurf@3.10-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.10-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931778?format=json","purl":"pkg:deb/debian/netsurf@3.11-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.11-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931777?format=json","purl":"pkg:deb/debian/netsurf@3.11-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.11-3%3Fdistro=trixie"}],"aliases":["CVE-2015-7506"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-du81-6y36-tucd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92762?format=json","vulnerability_id":"VCID-g13j-r71a-ubfb","summary":"Heap-based buffer overflow in the bmp_decode_rle function in libnsbmp.c in Libnsbmp 0.1.2 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the last row of RLE data in a crafted BMP file.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7508","reference_id":"","reference_type":"","scores":[{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70346","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70354","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70352","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00629","scoring_system":"epss","scoring_elements":"0.70326","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73729","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73764","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73689","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73738","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73779","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73788","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73746","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73694","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7508"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810491","reference_id":"810491","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810491"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931780?format=json","purl":"pkg:deb/debian/netsurf@3.2%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.2%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931775?format=json","purl":"pkg:deb/debian/netsurf@3.10-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.10-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931778?format=json","purl":"pkg:deb/debian/netsurf@3.11-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.11-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931777?format=json","purl":"pkg:deb/debian/netsurf@3.11-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.11-3%3Fdistro=trixie"}],"aliases":["CVE-2015-7508"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g13j-r71a-ubfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92759?format=json","vulnerability_id":"VCID-t8zz-gpdg-4bbm","summary":"Stack-based buffer overflow in the gif_next_LZW function in libnsgif.c in Libnsgif 0.1.2 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted LZW stream in a GIF file.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7505","reference_id":"","reference_type":"","scores":[{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70534","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70542","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70515","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73855","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73924","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73848","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73897","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73939","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73948","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.7394","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73905","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73858","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00792","scoring_system":"epss","scoring_elements":"0.73883","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7505"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810491","reference_id":"810491","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810491"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931780?format=json","purl":"pkg:deb/debian/netsurf@3.2%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.2%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931775?format=json","purl":"pkg:deb/debian/netsurf@3.10-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.10-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931778?format=json","purl":"pkg:deb/debian/netsurf@3.11-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.11-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931777?format=json","purl":"pkg:deb/debian/netsurf@3.11-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.11-3%3Fdistro=trixie"}],"aliases":["CVE-2015-7505"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t8zz-gpdg-4bbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92761?format=json","vulnerability_id":"VCID-wvuu-zw8y-17hg","summary":"libnsbmp.c in Libnsbmp 0.1.2 allows context-dependent attackers to cause a denial of service (out-of-bounds read) via a crafted color table to the (1) bmp_decode_rgb or (2) bmp_decode_rle function.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7507","reference_id":"","reference_type":"","scores":[{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64398","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64452","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64483","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64441","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64506","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64521","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6451","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64481","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64515","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64527","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64519","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.7011","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70117","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70116","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70092","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7507"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810491","reference_id":"810491","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810491"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931780?format=json","purl":"pkg:deb/debian/netsurf@3.2%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.2%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931775?format=json","purl":"pkg:deb/debian/netsurf@3.10-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.10-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931778?format=json","purl":"pkg:deb/debian/netsurf@3.11-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.11-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931777?format=json","purl":"pkg:deb/debian/netsurf@3.11-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.11-3%3Fdistro=trixie"}],"aliases":["CVE-2015-7507"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wvuu-zw8y-17hg"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/netsurf@3.2%252Bdfsg-3%3Fdistro=trixie"}