Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/ImageMagick@6.0.7.1-17.el4_6?arch=1
Typerpm
Namespaceredhat
NameImageMagick
Version6.0.7.1-17.el4_6
Qualifiers
arch 1
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3cn6-jf51-3qdv
vulnerability_id VCID-3cn6-jf51-3qdv
summary
Multiple vulnerabilities have been discovered in ImageMagick, possibly
    resulting in arbitrary code execution or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4985.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4985.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4985
reference_id
reference_type
scores
0
value 0.0277
scoring_system epss
scoring_elements 0.8597
published_at 2026-04-01T12:55:00Z
1
value 0.0277
scoring_system epss
scoring_elements 0.85982
published_at 2026-04-02T12:55:00Z
2
value 0.0277
scoring_system epss
scoring_elements 0.85998
published_at 2026-04-04T12:55:00Z
3
value 0.0277
scoring_system epss
scoring_elements 0.85997
published_at 2026-04-07T12:55:00Z
4
value 0.0277
scoring_system epss
scoring_elements 0.86017
published_at 2026-04-08T12:55:00Z
5
value 0.0277
scoring_system epss
scoring_elements 0.86027
published_at 2026-04-09T12:55:00Z
6
value 0.0277
scoring_system epss
scoring_elements 0.86041
published_at 2026-04-11T12:55:00Z
7
value 0.0277
scoring_system epss
scoring_elements 0.86039
published_at 2026-04-12T12:55:00Z
8
value 0.0277
scoring_system epss
scoring_elements 0.86034
published_at 2026-04-13T12:55:00Z
9
value 0.0277
scoring_system epss
scoring_elements 0.86051
published_at 2026-04-16T12:55:00Z
10
value 0.0277
scoring_system epss
scoring_elements 0.86057
published_at 2026-04-18T12:55:00Z
11
value 0.0277
scoring_system epss
scoring_elements 0.86048
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4985
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=310091
reference_id 310091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=310091
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444266
reference_id 444266
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444266
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444267
reference_id 444267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444267
6
reference_url https://security.gentoo.org/glsa/200710-27
reference_id GLSA-200710-27
reference_type
scores
url https://security.gentoo.org/glsa/200710-27
7
reference_url https://access.redhat.com/errata/RHSA-2008:0145
reference_id RHSA-2008:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0145
8
reference_url https://access.redhat.com/errata/RHSA-2008:0165
reference_id RHSA-2008:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0165
9
reference_url https://usn.ubuntu.com/523-1/
reference_id USN-523-1
reference_type
scores
url https://usn.ubuntu.com/523-1/
fixed_packages
aliases CVE-2007-4985
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3cn6-jf51-3qdv
1
url VCID-5sxs-wpy9-rqfn
vulnerability_id VCID-5sxs-wpy9-rqfn
summary
Multiple vulnerabilities have been discovered in ImageMagick, possibly
    resulting in arbitrary code execution or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4988.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4988.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4988
reference_id
reference_type
scores
0
value 0.02298
scoring_system epss
scoring_elements 0.84657
published_at 2026-04-01T12:55:00Z
1
value 0.02298
scoring_system epss
scoring_elements 0.84672
published_at 2026-04-02T12:55:00Z
2
value 0.02298
scoring_system epss
scoring_elements 0.84693
published_at 2026-04-04T12:55:00Z
3
value 0.02298
scoring_system epss
scoring_elements 0.84695
published_at 2026-04-07T12:55:00Z
4
value 0.02298
scoring_system epss
scoring_elements 0.84717
published_at 2026-04-08T12:55:00Z
5
value 0.02298
scoring_system epss
scoring_elements 0.84724
published_at 2026-04-09T12:55:00Z
6
value 0.02298
scoring_system epss
scoring_elements 0.84742
published_at 2026-04-11T12:55:00Z
7
value 0.02298
scoring_system epss
scoring_elements 0.84737
published_at 2026-04-12T12:55:00Z
8
value 0.02298
scoring_system epss
scoring_elements 0.84731
published_at 2026-04-13T12:55:00Z
9
value 0.02298
scoring_system epss
scoring_elements 0.84752
published_at 2026-04-16T12:55:00Z
10
value 0.02298
scoring_system epss
scoring_elements 0.84754
published_at 2026-04-18T12:55:00Z
11
value 0.02298
scoring_system epss
scoring_elements 0.84755
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4988
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=310081
reference_id 310081
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=310081
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444266
reference_id 444266
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444266
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444267
reference_id 444267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444267
6
reference_url https://security.gentoo.org/glsa/200710-27
reference_id GLSA-200710-27
reference_type
scores
url https://security.gentoo.org/glsa/200710-27
7
reference_url https://access.redhat.com/errata/RHSA-2008:0145
reference_id RHSA-2008:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0145
8
reference_url https://usn.ubuntu.com/523-1/
reference_id USN-523-1
reference_type
scores
url https://usn.ubuntu.com/523-1/
fixed_packages
aliases CVE-2007-4988
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5sxs-wpy9-rqfn
2
url VCID-ebyn-hv86-8kdz
vulnerability_id VCID-ebyn-hv86-8kdz
summary Out of bound write in ImageMagick's XCF coder
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1096.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1096
reference_id
reference_type
scores
0
value 0.10772
scoring_system epss
scoring_elements 0.93312
published_at 2026-04-01T12:55:00Z
1
value 0.10772
scoring_system epss
scoring_elements 0.9332
published_at 2026-04-02T12:55:00Z
2
value 0.10772
scoring_system epss
scoring_elements 0.93326
published_at 2026-04-07T12:55:00Z
3
value 0.10772
scoring_system epss
scoring_elements 0.93334
published_at 2026-04-08T12:55:00Z
4
value 0.10772
scoring_system epss
scoring_elements 0.93339
published_at 2026-04-09T12:55:00Z
5
value 0.10772
scoring_system epss
scoring_elements 0.93343
published_at 2026-04-13T12:55:00Z
6
value 0.10772
scoring_system epss
scoring_elements 0.93342
published_at 2026-04-12T12:55:00Z
7
value 0.10772
scoring_system epss
scoring_elements 0.93361
published_at 2026-04-16T12:55:00Z
8
value 0.10772
scoring_system epss
scoring_elements 0.93365
published_at 2026-04-18T12:55:00Z
9
value 0.10772
scoring_system epss
scoring_elements 0.93372
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1096
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=286411
reference_id 286411
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=286411
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414370
reference_id 414370
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414370
5
reference_url https://access.redhat.com/errata/RHSA-2008:0145
reference_id RHSA-2008:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0145
6
reference_url https://usn.ubuntu.com/681-1/
reference_id USN-681-1
reference_type
scores
url https://usn.ubuntu.com/681-1/
fixed_packages
aliases CVE-2008-1096
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ebyn-hv86-8kdz
3
url VCID-p84t-bztf-cqdz
vulnerability_id VCID-p84t-bztf-cqdz
summary
Multiple vulnerabilities have been discovered in ImageMagick, possibly
    resulting in arbitrary code execution or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4986.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4986.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4986
reference_id
reference_type
scores
0
value 0.01545
scoring_system epss
scoring_elements 0.81328
published_at 2026-04-01T12:55:00Z
1
value 0.01545
scoring_system epss
scoring_elements 0.81337
published_at 2026-04-02T12:55:00Z
2
value 0.01545
scoring_system epss
scoring_elements 0.81359
published_at 2026-04-04T12:55:00Z
3
value 0.01545
scoring_system epss
scoring_elements 0.81358
published_at 2026-04-07T12:55:00Z
4
value 0.01545
scoring_system epss
scoring_elements 0.81387
published_at 2026-04-08T12:55:00Z
5
value 0.01545
scoring_system epss
scoring_elements 0.81392
published_at 2026-04-09T12:55:00Z
6
value 0.01545
scoring_system epss
scoring_elements 0.81413
published_at 2026-04-11T12:55:00Z
7
value 0.01545
scoring_system epss
scoring_elements 0.81401
published_at 2026-04-12T12:55:00Z
8
value 0.01545
scoring_system epss
scoring_elements 0.81393
published_at 2026-04-13T12:55:00Z
9
value 0.01545
scoring_system epss
scoring_elements 0.8143
published_at 2026-04-16T12:55:00Z
10
value 0.01545
scoring_system epss
scoring_elements 0.81431
published_at 2026-04-18T12:55:00Z
11
value 0.01545
scoring_system epss
scoring_elements 0.81432
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4986
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=310121
reference_id 310121
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=310121
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444266
reference_id 444266
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444266
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444267
reference_id 444267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444267
6
reference_url https://security.gentoo.org/glsa/200710-27
reference_id GLSA-200710-27
reference_type
scores
url https://security.gentoo.org/glsa/200710-27
7
reference_url https://access.redhat.com/errata/RHSA-2008:0145
reference_id RHSA-2008:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0145
8
reference_url https://access.redhat.com/errata/RHSA-2008:0165
reference_id RHSA-2008:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0165
9
reference_url https://usn.ubuntu.com/523-1/
reference_id USN-523-1
reference_type
scores
url https://usn.ubuntu.com/523-1/
fixed_packages
aliases CVE-2007-4986
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p84t-bztf-cqdz
4
url VCID-w278-q56x-j7fw
vulnerability_id VCID-w278-q56x-j7fw
summary
Multiple integer overflows have been discovered in ImageMagick allowing for
    the execution of arbitrary code.
references
0
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1797.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1797.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1797
reference_id
reference_type
scores
0
value 0.15619
scoring_system epss
scoring_elements 0.94714
published_at 2026-04-21T12:55:00Z
1
value 0.15619
scoring_system epss
scoring_elements 0.9466
published_at 2026-04-01T12:55:00Z
2
value 0.15619
scoring_system epss
scoring_elements 0.94667
published_at 2026-04-02T12:55:00Z
3
value 0.15619
scoring_system epss
scoring_elements 0.94672
published_at 2026-04-04T12:55:00Z
4
value 0.15619
scoring_system epss
scoring_elements 0.94674
published_at 2026-04-07T12:55:00Z
5
value 0.15619
scoring_system epss
scoring_elements 0.94684
published_at 2026-04-08T12:55:00Z
6
value 0.15619
scoring_system epss
scoring_elements 0.94689
published_at 2026-04-09T12:55:00Z
7
value 0.15619
scoring_system epss
scoring_elements 0.94693
published_at 2026-04-11T12:55:00Z
8
value 0.15619
scoring_system epss
scoring_elements 0.94696
published_at 2026-04-12T12:55:00Z
9
value 0.15619
scoring_system epss
scoring_elements 0.94697
published_at 2026-04-13T12:55:00Z
10
value 0.15619
scoring_system epss
scoring_elements 0.94707
published_at 2026-04-16T12:55:00Z
11
value 0.15619
scoring_system epss
scoring_elements 0.9471
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1797
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797
4
reference_url http://secunia.com/advisories/24721
reference_id
reference_type
scores
url http://secunia.com/advisories/24721
5
reference_url http://secunia.com/advisories/24739
reference_id
reference_type
scores
url http://secunia.com/advisories/24739
6
reference_url http://secunia.com/advisories/25072
reference_id
reference_type
scores
url http://secunia.com/advisories/25072
7
reference_url http://secunia.com/advisories/25206
reference_id
reference_type
scores
url http://secunia.com/advisories/25206
8
reference_url http://secunia.com/advisories/25992
reference_id
reference_type
scores
url http://secunia.com/advisories/25992
9
reference_url http://secunia.com/advisories/26177
reference_id
reference_type
scores
url http://secunia.com/advisories/26177
10
reference_url http://secunia.com/advisories/29786
reference_id
reference_type
scores
url http://secunia.com/advisories/29786
11
reference_url http://secunia.com/advisories/29857
reference_id
reference_type
scores
url http://secunia.com/advisories/29857
12
reference_url http://secunia.com/advisories/36260
reference_id
reference_type
scores
url http://secunia.com/advisories/36260
13
reference_url http://security.gentoo.org/glsa/glsa-200705-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-13.xml
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33376
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33376
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33377
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33377
16
reference_url https://issues.foresightlinux.org/browse/FL-222
reference_id
reference_type
scores
url https://issues.foresightlinux.org/browse/FL-222
17
reference_url https://issues.rpath.com/browse/RPL-1205
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1205
18
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254
19
reference_url http://www.debian.org/security/2009/dsa-1858
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1858
20
reference_url http://www.imagemagick.org/script/changelog.php
reference_id
reference_type
scores
url http://www.imagemagick.org/script/changelog.php
21
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:147
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:147
22
reference_url http://www.novell.com/linux/security/advisories/2007_8_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_8_sr.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2008-0145.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0145.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2008-0165.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0165.html
25
reference_url http://www.securityfocus.com/bid/23252
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23252
26
reference_url http://www.securityfocus.com/bid/23347
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23347
27
reference_url http://www.securitytracker.com/id?1017839
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017839
28
reference_url http://www.ubuntu.com/usn/usn-481-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-481-1
29
reference_url http://www.vupen.com/english/advisories/2007/1200
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1200
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=235071
reference_id 235071
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=235071
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.8:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.2.:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.2.:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.2.:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.8:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1797
reference_id CVE-2007-1797
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-1797
62
reference_url https://security.gentoo.org/glsa/200705-13
reference_id GLSA-200705-13
reference_type
scores
url https://security.gentoo.org/glsa/200705-13
63
reference_url https://access.redhat.com/errata/RHSA-2008:0145
reference_id RHSA-2008:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0145
64
reference_url https://access.redhat.com/errata/RHSA-2008:0165
reference_id RHSA-2008:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0165
65
reference_url https://usn.ubuntu.com/481-1/
reference_id USN-481-1
reference_type
scores
url https://usn.ubuntu.com/481-1/
fixed_packages
aliases CVE-2007-1797
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w278-q56x-j7fw
5
url VCID-znwq-9jw9-abgx
vulnerability_id VCID-znwq-9jw9-abgx
summary
Multiple vulnerabilities have been found in GraphicsMagick,
    allowing remote attackers to execute arbitrary code or cause a Denial of
    Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1097.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1097.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1097
reference_id
reference_type
scores
0
value 0.06243
scoring_system epss
scoring_elements 0.90851
published_at 2026-04-01T12:55:00Z
1
value 0.06243
scoring_system epss
scoring_elements 0.90857
published_at 2026-04-02T12:55:00Z
2
value 0.06243
scoring_system epss
scoring_elements 0.90867
published_at 2026-04-04T12:55:00Z
3
value 0.06243
scoring_system epss
scoring_elements 0.90877
published_at 2026-04-07T12:55:00Z
4
value 0.06243
scoring_system epss
scoring_elements 0.90889
published_at 2026-04-08T12:55:00Z
5
value 0.06243
scoring_system epss
scoring_elements 0.90896
published_at 2026-04-09T12:55:00Z
6
value 0.06243
scoring_system epss
scoring_elements 0.90905
published_at 2026-04-12T12:55:00Z
7
value 0.06243
scoring_system epss
scoring_elements 0.90903
published_at 2026-04-13T12:55:00Z
8
value 0.06243
scoring_system epss
scoring_elements 0.90928
published_at 2026-04-16T12:55:00Z
9
value 0.06243
scoring_system epss
scoring_elements 0.90925
published_at 2026-04-18T12:55:00Z
10
value 0.06243
scoring_system epss
scoring_elements 0.90926
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1097
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1097
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=285861
reference_id 285861
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=285861
4
reference_url https://security.gentoo.org/glsa/201311-10
reference_id GLSA-201311-10
reference_type
scores
url https://security.gentoo.org/glsa/201311-10
5
reference_url https://access.redhat.com/errata/RHSA-2008:0145
reference_id RHSA-2008:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0145
6
reference_url https://access.redhat.com/errata/RHSA-2008:0165
reference_id RHSA-2008:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0165
fixed_packages
aliases CVE-2008-1097
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-znwq-9jw9-abgx
Fixing_vulnerabilities
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ImageMagick@6.0.7.1-17.el4_6%3Farch=1