Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/352044?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/352044?format=api",
    "vulnerability_id": "VCID-ayjc-27p7-xkfs",
    "summary": "ImageMagick has has a stack-buffer-overflow in MNG encoder with oversized pallete\nThe patch for GHSA-7h7q-j33q-hvpf was incomplete and still allows a stack buffer overflow for the multi frame images.",
    "aliases": [
        {
            "alias": "GHSA-98cp-rj9f-6v5g"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1066781?format=api",
            "purl": "pkg:nuget/Magick.NET-Q16-arm64@14.12.0",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-arm64@14.12.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1066787?format=api",
            "purl": "pkg:nuget/Magick.NET-Q16-HDRI-arm64@14.12.0",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-arm64@14.12.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1066789?format=api",
            "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-arm64@14.12.0",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-arm64@14.12.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1067886?format=api",
            "purl": "pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-HDRI-OpenMP-x64@14.12.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1066783?format=api",
            "purl": "pkg:nuget/Magick.NET-Q16-OpenMP-arm64@14.12.0",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-OpenMP-arm64@14.12.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1066788?format=api",
            "purl": "pkg:nuget/Magick.NET-Q16-OpenMP-x64@14.12.0",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q16-OpenMP-x64@14.12.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1066780?format=api",
            "purl": "pkg:nuget/Magick.NET-Q8-arm64@14.12.0",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-arm64@14.12.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1066782?format=api",
            "purl": "pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.12.0",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.12.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1066784?format=api",
            "purl": "pkg:nuget/Magick.NET-Q8-OpenMP-x64@14.12.0",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-x64@14.12.0"
        }
    ],
    "affected_packages": [],
    "references": [
        {
            "reference_url": "https://github.com/ImageMagick/ImageMagick",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.9",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/ImageMagick/ImageMagick"
        },
        {
            "reference_url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-98cp-rj9f-6v5g",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.9",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "cvssv3.1_qr",
                    "scoring_elements": ""
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-98cp-rj9f-6v5g"
        },
        {
            "reference_url": "https://github.com/advisories/GHSA-98cp-rj9f-6v5g",
            "reference_id": "GHSA-98cp-rj9f-6v5g",
            "reference_type": "",
            "scores": [
                {
                    "value": "MODERATE",
                    "scoring_system": "cvssv3.1_qr",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/advisories/GHSA-98cp-rj9f-6v5g"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 121,
            "name": "Stack-based Buffer Overflow",
            "description": "A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function)."
        }
    ],
    "exploits": [],
    "severity_range_score": "4.0 - 6.9",
    "exploitability": null,
    "weighted_severity": null,
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ayjc-27p7-xkfs"
}