Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
Typeapk
Namespacealpine
Nameimagemagick6
Version6.9.10.37-r0
Qualifiers
arch ppc64le
distroversion v3.12
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version6.9.10.43-r0
Latest_non_vulnerable_version6.9.11.42-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-15mv-khzp-fqfk
vulnerability_id VCID-15mv-khzp-fqfk
summary ImageMagick: memory leak in WriteMSLImage of coders/msl.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18544.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18544.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18544
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35516
published_at 2026-04-01T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35718
published_at 2026-04-02T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35743
published_at 2026-04-04T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35624
published_at 2026-04-07T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.3567
published_at 2026-04-08T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35693
published_at 2026-04-09T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35703
published_at 2026-04-11T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35658
published_at 2026-04-12T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35636
published_at 2026-04-13T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35675
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18544
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642614
reference_id 1642614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642614
5
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
6
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-18544
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-15mv-khzp-fqfk
1
url VCID-1abc-45xr-5bhb
vulnerability_id VCID-1abc-45xr-5bhb
summary ImageMagick: memory leak in ReadBGRImage in coders/bgr.c.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17967.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17967.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-17967
reference_id
reference_type
scores
0
value 0.0038
scoring_system epss
scoring_elements 0.59344
published_at 2026-04-01T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.59417
published_at 2026-04-02T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.59441
published_at 2026-04-04T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.59407
published_at 2026-04-07T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.59458
published_at 2026-04-08T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.59471
published_at 2026-04-09T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.5949
published_at 2026-04-11T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.59474
published_at 2026-04-12T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59455
published_at 2026-04-13T12:55:00Z
9
value 0.0038
scoring_system epss
scoring_elements 0.59487
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-17967
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17967
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1636590
reference_id 1636590
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1636590
5
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-17967
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1abc-45xr-5bhb
2
url VCID-1e38-tmxy-9kew
vulnerability_id VCID-1e38-tmxy-9kew
summary ImageMagick: memory leak in WriteSGIImage in coders/sgi.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17965.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17965.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-17965
reference_id
reference_type
scores
0
value 0.0039
scoring_system epss
scoring_elements 0.59966
published_at 2026-04-01T12:55:00Z
1
value 0.0039
scoring_system epss
scoring_elements 0.60043
published_at 2026-04-02T12:55:00Z
2
value 0.0039
scoring_system epss
scoring_elements 0.60068
published_at 2026-04-04T12:55:00Z
3
value 0.0039
scoring_system epss
scoring_elements 0.60038
published_at 2026-04-07T12:55:00Z
4
value 0.0039
scoring_system epss
scoring_elements 0.60088
published_at 2026-04-08T12:55:00Z
5
value 0.0039
scoring_system epss
scoring_elements 0.60102
published_at 2026-04-09T12:55:00Z
6
value 0.0039
scoring_system epss
scoring_elements 0.60123
published_at 2026-04-11T12:55:00Z
7
value 0.0039
scoring_system epss
scoring_elements 0.60109
published_at 2026-04-12T12:55:00Z
8
value 0.0039
scoring_system epss
scoring_elements 0.60091
published_at 2026-04-13T12:55:00Z
9
value 0.0039
scoring_system epss
scoring_elements 0.6013
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-17965
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17965
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1636592
reference_id 1636592
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1636592
5
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-17965
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1e38-tmxy-9kew
3
url VCID-1ftp-6fvm-rfez
vulnerability_id VCID-1ftp-6fvm-rfez
summary ImageMagick: memory leak in ReadOneJNGImage function in coders/png.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16640.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16640
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42286
published_at 2026-04-16T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42235
published_at 2026-04-13T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.5276
published_at 2026-04-02T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52787
published_at 2026-04-04T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.52754
published_at 2026-04-07T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52805
published_at 2026-04-08T12:55:00Z
6
value 0.00295
scoring_system epss
scoring_elements 0.52799
published_at 2026-04-09T12:55:00Z
7
value 0.00295
scoring_system epss
scoring_elements 0.5285
published_at 2026-04-11T12:55:00Z
8
value 0.00295
scoring_system epss
scoring_elements 0.52833
published_at 2026-04-12T12:55:00Z
9
value 0.00295
scoring_system epss
scoring_elements 0.52737
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16640
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1626570
reference_id 1626570
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1626570
5
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
6
reference_url https://usn.ubuntu.com/3785-1/
reference_id USN-3785-1
reference_type
scores
url https://usn.ubuntu.com/3785-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-16640
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ftp-6fvm-rfez
4
url VCID-1x5f-2jf7-hbb2
vulnerability_id VCID-1x5f-2jf7-hbb2
summary ImageMagick: memory leak in ReadMIFFImage in coders/miff.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14436.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14436.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14436
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33305
published_at 2026-04-01T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33366
published_at 2026-04-16T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33392
published_at 2026-04-11T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33351
published_at 2026-04-12T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33328
published_at 2026-04-13T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33441
published_at 2026-04-02T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33472
published_at 2026-04-04T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.3331
published_at 2026-04-07T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33356
published_at 2026-04-08T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33389
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14436
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/ImageMagick/ImageMagick/issues/1191
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1191
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1609939
reference_id 1609939
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1609939
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-14436
reference_id CVE-2018-14436
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-14436
11
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
12
reference_url https://usn.ubuntu.com/3785-1/
reference_id USN-3785-1
reference_type
scores
url https://usn.ubuntu.com/3785-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-14436
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1x5f-2jf7-hbb2
5
url VCID-2r23-hhkx-9fh6
vulnerability_id VCID-2r23-hhkx-9fh6
summary ImageMagick: double free in WriteEPTImage function in coders/ept.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8804.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8804.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8804
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62894
published_at 2026-04-16T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62854
published_at 2026-04-13T12:55:00Z
2
value 0.0046
scoring_system epss
scoring_elements 0.64092
published_at 2026-04-02T12:55:00Z
3
value 0.0046
scoring_system epss
scoring_elements 0.64119
published_at 2026-04-04T12:55:00Z
4
value 0.0046
scoring_system epss
scoring_elements 0.64078
published_at 2026-04-07T12:55:00Z
5
value 0.0046
scoring_system epss
scoring_elements 0.64129
published_at 2026-04-08T12:55:00Z
6
value 0.0046
scoring_system epss
scoring_elements 0.64145
published_at 2026-04-09T12:55:00Z
7
value 0.0046
scoring_system epss
scoring_elements 0.64157
published_at 2026-04-11T12:55:00Z
8
value 0.0046
scoring_system epss
scoring_elements 0.64146
published_at 2026-04-12T12:55:00Z
9
value 0.0046
scoring_system epss
scoring_elements 0.64035
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8804
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8804
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1559892
reference_id 1559892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1559892
5
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
6
reference_url https://usn.ubuntu.com/3681-1/
reference_id USN-3681-1
reference_type
scores
url https://usn.ubuntu.com/3681-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-8804
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2r23-hhkx-9fh6
6
url VCID-3qad-mewf-8khz
vulnerability_id VCID-3qad-mewf-8khz
summary ImageMagick: Memory leak in the WritePDFImage function in coders/pdf.c
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7397.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7397.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-7397
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.51521
published_at 2026-04-01T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.51662
published_at 2026-04-16T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.51658
published_at 2026-04-11T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.51637
published_at 2026-04-12T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.5162
published_at 2026-04-13T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51572
published_at 2026-04-02T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.51598
published_at 2026-04-04T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.51559
published_at 2026-04-07T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51613
published_at 2026-04-08T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.51609
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-7397
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
48
reference_url https://github.com/ImageMagick/ImageMagick/issues/1454
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1454
49
reference_url https://www.debian.org/security/2020/dsa-4712
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4712
50
reference_url http://www.securityfocus.com/bid/106847
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106847
51
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1672564
reference_id 1672564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1672564
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-7397
reference_id CVE-2019-7397
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-7397
61
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
62
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
63
reference_url https://usn.ubuntu.com/7068-1/
reference_id USN-7068-1
reference_type
scores
url https://usn.ubuntu.com/7068-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2019-7397
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qad-mewf-8khz
7
url VCID-4kxf-5xrh-uue8
vulnerability_id VCID-4kxf-5xrh-uue8
summary ImageMagick: reachable assertion in ReadOneJNGImage in coders/png.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16749.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16749.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16749
reference_id
reference_type
scores
0
value 0.00241
scoring_system epss
scoring_elements 0.47359
published_at 2026-04-01T12:55:00Z
1
value 0.00241
scoring_system epss
scoring_elements 0.47394
published_at 2026-04-02T12:55:00Z
2
value 0.00241
scoring_system epss
scoring_elements 0.47416
published_at 2026-04-04T12:55:00Z
3
value 0.00241
scoring_system epss
scoring_elements 0.47365
published_at 2026-04-07T12:55:00Z
4
value 0.00241
scoring_system epss
scoring_elements 0.4742
published_at 2026-04-08T12:55:00Z
5
value 0.00241
scoring_system epss
scoring_elements 0.47418
published_at 2026-04-09T12:55:00Z
6
value 0.00241
scoring_system epss
scoring_elements 0.47442
published_at 2026-04-11T12:55:00Z
7
value 0.00241
scoring_system epss
scoring_elements 0.47417
published_at 2026-04-12T12:55:00Z
8
value 0.00241
scoring_system epss
scoring_elements 0.47423
published_at 2026-04-13T12:55:00Z
9
value 0.00241
scoring_system epss
scoring_elements 0.47482
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16749
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16749
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1627916
reference_id 1627916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1627916
5
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
6
reference_url https://usn.ubuntu.com/3785-1/
reference_id USN-3785-1
reference_type
scores
url https://usn.ubuntu.com/3785-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-16749
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4kxf-5xrh-uue8
8
url VCID-57gx-fkgs-f7cb
vulnerability_id VCID-57gx-fkgs-f7cb
summary ImageMagick: denial of service (DoS) in IsWEBPImageLossless function in coders/webp.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7470.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7470.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7470
reference_id
reference_type
scores
0
value 0.00233
scoring_system epss
scoring_elements 0.4625
published_at 2026-04-16T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.46193
published_at 2026-04-13T12:55:00Z
2
value 0.00252
scoring_system epss
scoring_elements 0.4847
published_at 2026-04-02T12:55:00Z
3
value 0.00252
scoring_system epss
scoring_elements 0.48492
published_at 2026-04-12T12:55:00Z
4
value 0.00252
scoring_system epss
scoring_elements 0.48445
published_at 2026-04-07T12:55:00Z
5
value 0.00252
scoring_system epss
scoring_elements 0.48499
published_at 2026-04-08T12:55:00Z
6
value 0.00252
scoring_system epss
scoring_elements 0.48495
published_at 2026-04-09T12:55:00Z
7
value 0.00252
scoring_system epss
scoring_elements 0.48519
published_at 2026-04-11T12:55:00Z
8
value 0.00252
scoring_system epss
scoring_elements 0.48434
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7470
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7470
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549786
reference_id 1549786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549786
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891420
reference_id 891420
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891420
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-7470
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-57gx-fkgs-f7cb
9
url VCID-5fc9-tutn-dubw
vulnerability_id VCID-5fc9-tutn-dubw
summary ImageMagick: memory leak in WritePDBImage in coders/pdb.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17966.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17966.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-17966
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26595
published_at 2026-04-16T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26588
published_at 2026-04-13T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32692
published_at 2026-04-02T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32727
published_at 2026-04-04T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32548
published_at 2026-04-07T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32596
published_at 2026-04-08T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32622
published_at 2026-04-09T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32623
published_at 2026-04-11T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32584
published_at 2026-04-12T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32551
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-17966
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1636587
reference_id 1636587
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1636587
5
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
6
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
7
reference_url https://usn.ubuntu.com/6980-1/
reference_id USN-6980-1
reference_type
scores
url https://usn.ubuntu.com/6980-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-17966
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5fc9-tutn-dubw
10
url VCID-6wy3-xwez-vfej
vulnerability_id VCID-6wy3-xwez-vfej
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16412.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16412.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16412
reference_id
reference_type
scores
0
value 0.01034
scoring_system epss
scoring_elements 0.77306
published_at 2026-04-01T12:55:00Z
1
value 0.01034
scoring_system epss
scoring_elements 0.77313
published_at 2026-04-02T12:55:00Z
2
value 0.01034
scoring_system epss
scoring_elements 0.77342
published_at 2026-04-04T12:55:00Z
3
value 0.01034
scoring_system epss
scoring_elements 0.77322
published_at 2026-04-07T12:55:00Z
4
value 0.01034
scoring_system epss
scoring_elements 0.77352
published_at 2026-04-08T12:55:00Z
5
value 0.01034
scoring_system epss
scoring_elements 0.77362
published_at 2026-04-09T12:55:00Z
6
value 0.01034
scoring_system epss
scoring_elements 0.77388
published_at 2026-04-11T12:55:00Z
7
value 0.01034
scoring_system epss
scoring_elements 0.77367
published_at 2026-04-12T12:55:00Z
8
value 0.01034
scoring_system epss
scoring_elements 0.77364
published_at 2026-04-13T12:55:00Z
9
value 0.01034
scoring_system epss
scoring_elements 0.77404
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16412
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16412
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16413
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16642
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16645
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1625429
reference_id 1625429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1625429
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910887
reference_id 910887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910887
10
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
11
reference_url https://usn.ubuntu.com/6980-1/
reference_id USN-6980-1
reference_type
scores
url https://usn.ubuntu.com/6980-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-16412
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6wy3-xwez-vfej
11
url VCID-78zg-am5w-gugh
vulnerability_id VCID-78zg-am5w-gugh
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12600.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12600
reference_id
reference_type
scores
0
value 0.00329
scoring_system epss
scoring_elements 0.55776
published_at 2026-04-01T12:55:00Z
1
value 0.00329
scoring_system epss
scoring_elements 0.5595
published_at 2026-04-16T12:55:00Z
2
value 0.00329
scoring_system epss
scoring_elements 0.55952
published_at 2026-04-11T12:55:00Z
3
value 0.00329
scoring_system epss
scoring_elements 0.55931
published_at 2026-04-12T12:55:00Z
4
value 0.00329
scoring_system epss
scoring_elements 0.55914
published_at 2026-04-13T12:55:00Z
5
value 0.00329
scoring_system epss
scoring_elements 0.55889
published_at 2026-04-07T12:55:00Z
6
value 0.00329
scoring_system epss
scoring_elements 0.55911
published_at 2026-04-04T12:55:00Z
7
value 0.00329
scoring_system epss
scoring_elements 0.5594
published_at 2026-04-08T12:55:00Z
8
value 0.00329
scoring_system epss
scoring_elements 0.55942
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11251
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12599
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12600
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5248
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/ImageMagick/ImageMagick/issues/1178
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1178
8
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00004.html
9
reference_url https://www.debian.org/security/2018/dsa-4245
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4245
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1594339
reference_id 1594339
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1594339
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=902728
reference_id 902728
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=902728
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.8-3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12600
reference_id CVE-2018-12600
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12600
20
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
21
reference_url https://usn.ubuntu.com/3711-1/
reference_id USN-3711-1
reference_type
scores
url https://usn.ubuntu.com/3711-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-12600
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-78zg-am5w-gugh
12
url VCID-7fw6-fzyj-7qf3
vulnerability_id VCID-7fw6-fzyj-7qf3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16645.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16645.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16645
reference_id
reference_type
scores
0
value 0.00368
scoring_system epss
scoring_elements 0.58789
published_at 2026-04-16T12:55:00Z
1
value 0.00368
scoring_system epss
scoring_elements 0.58757
published_at 2026-04-13T12:55:00Z
2
value 0.0056
scoring_system epss
scoring_elements 0.68231
published_at 2026-04-02T12:55:00Z
3
value 0.0056
scoring_system epss
scoring_elements 0.6825
published_at 2026-04-04T12:55:00Z
4
value 0.0056
scoring_system epss
scoring_elements 0.68226
published_at 2026-04-07T12:55:00Z
5
value 0.0056
scoring_system epss
scoring_elements 0.68276
published_at 2026-04-08T12:55:00Z
6
value 0.0056
scoring_system epss
scoring_elements 0.68292
published_at 2026-04-09T12:55:00Z
7
value 0.0056
scoring_system epss
scoring_elements 0.68317
published_at 2026-04-11T12:55:00Z
8
value 0.0056
scoring_system epss
scoring_elements 0.68305
published_at 2026-04-12T12:55:00Z
9
value 0.0056
scoring_system epss
scoring_elements 0.6821
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16645
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16412
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16413
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16642
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16645
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1626611
reference_id 1626611
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1626611
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910889
reference_id 910889
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910889
10
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
11
reference_url https://usn.ubuntu.com/3785-1/
reference_id USN-3785-1
reference_type
scores
url https://usn.ubuntu.com/3785-1/
12
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-16645
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7fw6-fzyj-7qf3
13
url VCID-7jx8-htkz-7qd4
vulnerability_id VCID-7jx8-htkz-7qd4
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16644.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16644.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16644
reference_id
reference_type
scores
0
value 0.00241
scoring_system epss
scoring_elements 0.47305
published_at 2026-04-01T12:55:00Z
1
value 0.00241
scoring_system epss
scoring_elements 0.47341
published_at 2026-04-02T12:55:00Z
2
value 0.00241
scoring_system epss
scoring_elements 0.47362
published_at 2026-04-09T12:55:00Z
3
value 0.00241
scoring_system epss
scoring_elements 0.47309
published_at 2026-04-07T12:55:00Z
4
value 0.00241
scoring_system epss
scoring_elements 0.47365
published_at 2026-04-08T12:55:00Z
5
value 0.00241
scoring_system epss
scoring_elements 0.47386
published_at 2026-04-11T12:55:00Z
6
value 0.00241
scoring_system epss
scoring_elements 0.47361
published_at 2026-04-12T12:55:00Z
7
value 0.00241
scoring_system epss
scoring_elements 0.47368
published_at 2026-04-13T12:55:00Z
8
value 0.00241
scoring_system epss
scoring_elements 0.47427
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16644
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16412
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16413
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16642
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16645
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1626606
reference_id 1626606
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1626606
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910888
reference_id 910888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910888
10
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
11
reference_url https://usn.ubuntu.com/3785-1/
reference_id USN-3785-1
reference_type
scores
url https://usn.ubuntu.com/3785-1/
12
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-16644
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jx8-htkz-7qd4
14
url VCID-7ynu-qf57-ykba
vulnerability_id VCID-7ynu-qf57-ykba
summary ImageMagick: memory leak in the XMagickCommand function in MagickCore/animate.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13153.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-13153
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41603
published_at 2026-04-01T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41679
published_at 2026-04-13T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41726
published_at 2026-04-16T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41693
published_at 2026-04-12T12:55:00Z
4
value 0.00197
scoring_system epss
scoring_elements 0.4169
published_at 2026-04-02T12:55:00Z
5
value 0.00197
scoring_system epss
scoring_elements 0.41718
published_at 2026-04-04T12:55:00Z
6
value 0.00197
scoring_system epss
scoring_elements 0.41645
published_at 2026-04-07T12:55:00Z
7
value 0.00197
scoring_system epss
scoring_elements 0.41695
published_at 2026-04-08T12:55:00Z
8
value 0.00197
scoring_system epss
scoring_elements 0.41703
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-13153
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
3
reference_url https://github.com/ImageMagick/ImageMagick/issues/1195
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1195
4
reference_url http://www.securityfocus.com/bid/104687
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104687
5
reference_url http://www.securitytracker.com/id/1041219
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041219
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1598471
reference_id 1598471
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1598471
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-13153
reference_id CVE-2018-13153
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-13153
13
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
14
reference_url https://usn.ubuntu.com/3711-1/
reference_id USN-3711-1
reference_type
scores
url https://usn.ubuntu.com/3711-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-13153
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ynu-qf57-ykba
15
url VCID-8n3f-ass1-97gj
vulnerability_id VCID-8n3f-ass1-97gj
summary ImageMagick: Memory Leak in ReadRLAImage in coders/rla.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5247.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5247.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5247
reference_id
reference_type
scores
0
value 0.0057
scoring_system epss
scoring_elements 0.68521
published_at 2026-04-01T12:55:00Z
1
value 0.0057
scoring_system epss
scoring_elements 0.68628
published_at 2026-04-16T12:55:00Z
2
value 0.0057
scoring_system epss
scoring_elements 0.6863
published_at 2026-04-11T12:55:00Z
3
value 0.0057
scoring_system epss
scoring_elements 0.68618
published_at 2026-04-12T12:55:00Z
4
value 0.0057
scoring_system epss
scoring_elements 0.68588
published_at 2026-04-13T12:55:00Z
5
value 0.0057
scoring_system epss
scoring_elements 0.68539
published_at 2026-04-02T12:55:00Z
6
value 0.0057
scoring_system epss
scoring_elements 0.68558
published_at 2026-04-04T12:55:00Z
7
value 0.0057
scoring_system epss
scoring_elements 0.68536
published_at 2026-04-07T12:55:00Z
8
value 0.0057
scoring_system epss
scoring_elements 0.68587
published_at 2026-04-08T12:55:00Z
9
value 0.0057
scoring_system epss
scoring_elements 0.68605
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5247
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/ImageMagick/ImageMagick/issues/928
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/928
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1533553
reference_id 1533553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1533553
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.7-17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.7-17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.7-17:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5247
reference_id CVE-2018-5247
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5247
12
reference_url https://usn.ubuntu.com/3681-1/
reference_id USN-3681-1
reference_type
scores
url https://usn.ubuntu.com/3681-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-5247
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8n3f-ass1-97gj
16
url VCID-9ark-hra3-zyh9
vulnerability_id VCID-9ark-hra3-zyh9
summary ImageMagick: Heap-based buffer over-read in coders/webp.c:IsWEBPImageLossless()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-9135.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-9135.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-9135
reference_id
reference_type
scores
0
value 0.00329
scoring_system epss
scoring_elements 0.55709
published_at 2026-04-01T12:55:00Z
1
value 0.00329
scoring_system epss
scoring_elements 0.55821
published_at 2026-04-02T12:55:00Z
2
value 0.00329
scoring_system epss
scoring_elements 0.55844
published_at 2026-04-04T12:55:00Z
3
value 0.00329
scoring_system epss
scoring_elements 0.55822
published_at 2026-04-07T12:55:00Z
4
value 0.00329
scoring_system epss
scoring_elements 0.55873
published_at 2026-04-08T12:55:00Z
5
value 0.00329
scoring_system epss
scoring_elements 0.55876
published_at 2026-04-09T12:55:00Z
6
value 0.00329
scoring_system epss
scoring_elements 0.55886
published_at 2026-04-11T12:55:00Z
7
value 0.00329
scoring_system epss
scoring_elements 0.55866
published_at 2026-04-12T12:55:00Z
8
value 0.00329
scoring_system epss
scoring_elements 0.55848
published_at 2026-04-13T12:55:00Z
9
value 0.00329
scoring_system epss
scoring_elements 0.55884
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-9135
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9135
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1563889
reference_id 1563889
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1563889
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-9135
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ark-hra3-zyh9
17
url VCID-b32k-mwuv-hfeq
vulnerability_id VCID-b32k-mwuv-hfeq
summary imagemagick: memory leak in function DecodeImage in coders/pcd.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7175.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7175.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-7175
reference_id
reference_type
scores
0
value 0.0023
scoring_system epss
scoring_elements 0.45765
published_at 2026-04-01T12:55:00Z
1
value 0.0023
scoring_system epss
scoring_elements 0.45908
published_at 2026-04-16T12:55:00Z
2
value 0.0023
scoring_system epss
scoring_elements 0.45877
published_at 2026-04-11T12:55:00Z
3
value 0.0023
scoring_system epss
scoring_elements 0.45847
published_at 2026-04-12T12:55:00Z
4
value 0.0023
scoring_system epss
scoring_elements 0.45854
published_at 2026-04-13T12:55:00Z
5
value 0.0023
scoring_system epss
scoring_elements 0.4583
published_at 2026-04-02T12:55:00Z
6
value 0.0023
scoring_system epss
scoring_elements 0.45852
published_at 2026-04-04T12:55:00Z
7
value 0.0023
scoring_system epss
scoring_elements 0.45802
published_at 2026-04-07T12:55:00Z
8
value 0.0023
scoring_system epss
scoring_elements 0.45858
published_at 2026-04-08T12:55:00Z
9
value 0.0023
scoring_system epss
scoring_elements 0.45855
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-7175
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
45
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
46
reference_url https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
47
reference_url https://github.com/ImageMagick/ImageMagick/issues/1450
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1450
48
reference_url https://www.debian.org/security/2020/dsa-4712
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4712
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1687436
reference_id 1687436
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1687436
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-7175
reference_id CVE-2019-7175
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-7175
58
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
59
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
60
reference_url https://usn.ubuntu.com/7053-1/
reference_id USN-7053-1
reference_type
scores
url https://usn.ubuntu.com/7053-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2019-7175
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b32k-mwuv-hfeq
18
url VCID-b7dh-gjtk-qfhn
vulnerability_id VCID-b7dh-gjtk-qfhn
summary ImageMagick: memory leak in coders/json.c:EncodeImageAttributes could cause crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5358.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5358.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5358
reference_id
reference_type
scores
0
value 0.00408
scoring_system epss
scoring_elements 0.61062
published_at 2026-04-01T12:55:00Z
1
value 0.00408
scoring_system epss
scoring_elements 0.61139
published_at 2026-04-02T12:55:00Z
2
value 0.00408
scoring_system epss
scoring_elements 0.61167
published_at 2026-04-04T12:55:00Z
3
value 0.00408
scoring_system epss
scoring_elements 0.61133
published_at 2026-04-07T12:55:00Z
4
value 0.00408
scoring_system epss
scoring_elements 0.61181
published_at 2026-04-08T12:55:00Z
5
value 0.00408
scoring_system epss
scoring_elements 0.61196
published_at 2026-04-09T12:55:00Z
6
value 0.00408
scoring_system epss
scoring_elements 0.61216
published_at 2026-04-11T12:55:00Z
7
value 0.00408
scoring_system epss
scoring_elements 0.61203
published_at 2026-04-12T12:55:00Z
8
value 0.00408
scoring_system epss
scoring_elements 0.61184
published_at 2026-04-13T12:55:00Z
9
value 0.00408
scoring_system epss
scoring_elements 0.61224
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5358
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534380
reference_id 1534380
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534380
4
reference_url https://usn.ubuntu.com/3681-1/
reference_id USN-3681-1
reference_type
scores
url https://usn.ubuntu.com/3681-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-5358
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7dh-gjtk-qfhn
19
url VCID-bwvj-wd53-e7ea
vulnerability_id VCID-bwvj-wd53-e7ea
summary ImageMagick: CPU Exhaustion via crafted input file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15607.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-15607
reference_id
reference_type
scores
0
value 0.00908
scoring_system epss
scoring_elements 0.75717
published_at 2026-04-01T12:55:00Z
1
value 0.00908
scoring_system epss
scoring_elements 0.75719
published_at 2026-04-02T12:55:00Z
2
value 0.00908
scoring_system epss
scoring_elements 0.7575
published_at 2026-04-04T12:55:00Z
3
value 0.00908
scoring_system epss
scoring_elements 0.75729
published_at 2026-04-07T12:55:00Z
4
value 0.00908
scoring_system epss
scoring_elements 0.75763
published_at 2026-04-08T12:55:00Z
5
value 0.00908
scoring_system epss
scoring_elements 0.75774
published_at 2026-04-09T12:55:00Z
6
value 0.00908
scoring_system epss
scoring_elements 0.75798
published_at 2026-04-11T12:55:00Z
7
value 0.00908
scoring_system epss
scoring_elements 0.75779
published_at 2026-04-12T12:55:00Z
8
value 0.00908
scoring_system epss
scoring_elements 0.75773
published_at 2026-04-13T12:55:00Z
9
value 0.00908
scoring_system epss
scoring_elements 0.75811
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-15607
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1622738
reference_id 1622738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1622738
5
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
6
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-15607
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bwvj-wd53-e7ea
20
url VCID-chgt-azpf-auba
vulnerability_id VCID-chgt-azpf-auba
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16642.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16642.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16642
reference_id
reference_type
scores
0
value 0.00307
scoring_system epss
scoring_elements 0.53847
published_at 2026-04-01T12:55:00Z
1
value 0.00307
scoring_system epss
scoring_elements 0.53864
published_at 2026-04-02T12:55:00Z
2
value 0.00307
scoring_system epss
scoring_elements 0.53893
published_at 2026-04-04T12:55:00Z
3
value 0.00307
scoring_system epss
scoring_elements 0.53867
published_at 2026-04-07T12:55:00Z
4
value 0.00307
scoring_system epss
scoring_elements 0.53919
published_at 2026-04-08T12:55:00Z
5
value 0.00307
scoring_system epss
scoring_elements 0.53918
published_at 2026-04-09T12:55:00Z
6
value 0.00307
scoring_system epss
scoring_elements 0.53964
published_at 2026-04-11T12:55:00Z
7
value 0.00307
scoring_system epss
scoring_elements 0.53947
published_at 2026-04-12T12:55:00Z
8
value 0.00307
scoring_system epss
scoring_elements 0.5393
published_at 2026-04-13T12:55:00Z
9
value 0.00307
scoring_system epss
scoring_elements 0.53968
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16642
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16412
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16413
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16642
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16645
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1626591
reference_id 1626591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1626591
9
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
10
reference_url https://usn.ubuntu.com/3785-1/
reference_id USN-3785-1
reference_type
scores
url https://usn.ubuntu.com/3785-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-16642
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-chgt-azpf-auba
21
url VCID-dkf5-8kww-mkhn
vulnerability_id VCID-dkf5-8kww-mkhn
summary ImageMagick: Memory allocation failure in ReadTIFFImage function in memory.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7443.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7443.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7443
reference_id
reference_type
scores
0
value 0.00441
scoring_system epss
scoring_elements 0.63115
published_at 2026-04-01T12:55:00Z
1
value 0.00441
scoring_system epss
scoring_elements 0.63175
published_at 2026-04-02T12:55:00Z
2
value 0.00441
scoring_system epss
scoring_elements 0.63205
published_at 2026-04-13T12:55:00Z
3
value 0.00441
scoring_system epss
scoring_elements 0.63169
published_at 2026-04-07T12:55:00Z
4
value 0.00441
scoring_system epss
scoring_elements 0.63221
published_at 2026-04-08T12:55:00Z
5
value 0.00441
scoring_system epss
scoring_elements 0.63239
published_at 2026-04-09T12:55:00Z
6
value 0.00441
scoring_system epss
scoring_elements 0.63257
published_at 2026-04-11T12:55:00Z
7
value 0.00441
scoring_system epss
scoring_elements 0.63241
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7443
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7443
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549668
reference_id 1549668
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549668
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891291
reference_id 891291
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891291
6
reference_url https://usn.ubuntu.com/3681-1/
reference_id USN-3681-1
reference_type
scores
url https://usn.ubuntu.com/3681-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-7443
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dkf5-8kww-mkhn
22
url VCID-et5y-g25w-4qay
vulnerability_id VCID-et5y-g25w-4qay
summary ImageMagick: Memory Leak in ReadPATTERNImage in coders/pattern.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5246.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5246.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5246
reference_id
reference_type
scores
0
value 0.00281
scoring_system epss
scoring_elements 0.5143
published_at 2026-04-01T12:55:00Z
1
value 0.00281
scoring_system epss
scoring_elements 0.51573
published_at 2026-04-16T12:55:00Z
2
value 0.00281
scoring_system epss
scoring_elements 0.51541
published_at 2026-04-12T12:55:00Z
3
value 0.00281
scoring_system epss
scoring_elements 0.5153
published_at 2026-04-13T12:55:00Z
4
value 0.00281
scoring_system epss
scoring_elements 0.5148
published_at 2026-04-02T12:55:00Z
5
value 0.00281
scoring_system epss
scoring_elements 0.51508
published_at 2026-04-04T12:55:00Z
6
value 0.00281
scoring_system epss
scoring_elements 0.51467
published_at 2026-04-07T12:55:00Z
7
value 0.00281
scoring_system epss
scoring_elements 0.51521
published_at 2026-04-08T12:55:00Z
8
value 0.00281
scoring_system epss
scoring_elements 0.51518
published_at 2026-04-09T12:55:00Z
9
value 0.00281
scoring_system epss
scoring_elements 0.51562
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5246
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
3
reference_url https://github.com/ImageMagick/ImageMagick/issues/929
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/929
4
reference_url http://www.securityfocus.com/bid/102469
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102469
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1533546
reference_id 1533546
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1533546
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.7-17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.7-17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.7-17:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5246
reference_id CVE-2018-5246
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5246
12
reference_url https://usn.ubuntu.com/3681-1/
reference_id USN-3681-1
reference_type
scores
url https://usn.ubuntu.com/3681-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-5246
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-et5y-g25w-4qay
23
url VCID-jz9p-mte7-vfb3
vulnerability_id VCID-jz9p-mte7-vfb3
summary ImageMagick: Memory leak in the formatIPTCfromBuffer function in coders/meta.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16750.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16750.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16750
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32668
published_at 2026-04-01T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.328
published_at 2026-04-02T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32836
published_at 2026-04-04T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.32658
published_at 2026-04-07T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32706
published_at 2026-04-08T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32732
published_at 2026-04-09T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.32733
published_at 2026-04-11T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32696
published_at 2026-04-12T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.32669
published_at 2026-04-13T12:55:00Z
9
value 0.00132
scoring_system epss
scoring_elements 0.32708
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16750
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1627917
reference_id 1627917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1627917
5
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
6
reference_url https://usn.ubuntu.com/3785-1/
reference_id USN-3785-1
reference_type
scores
url https://usn.ubuntu.com/3785-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-16750
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jz9p-mte7-vfb3
24
url VCID-kd82-724m-77h8
vulnerability_id VCID-kd82-724m-77h8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12599.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12599
reference_id
reference_type
scores
0
value 0.00329
scoring_system epss
scoring_elements 0.55776
published_at 2026-04-01T12:55:00Z
1
value 0.00329
scoring_system epss
scoring_elements 0.5595
published_at 2026-04-16T12:55:00Z
2
value 0.00329
scoring_system epss
scoring_elements 0.55952
published_at 2026-04-11T12:55:00Z
3
value 0.00329
scoring_system epss
scoring_elements 0.55931
published_at 2026-04-12T12:55:00Z
4
value 0.00329
scoring_system epss
scoring_elements 0.55914
published_at 2026-04-13T12:55:00Z
5
value 0.00329
scoring_system epss
scoring_elements 0.55889
published_at 2026-04-07T12:55:00Z
6
value 0.00329
scoring_system epss
scoring_elements 0.55911
published_at 2026-04-04T12:55:00Z
7
value 0.00329
scoring_system epss
scoring_elements 0.5594
published_at 2026-04-08T12:55:00Z
8
value 0.00329
scoring_system epss
scoring_elements 0.55942
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11251
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12599
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12600
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5248
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/ImageMagick/ImageMagick/issues/1177
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1177
8
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00004.html
9
reference_url https://www.debian.org/security/2018/dsa-4245
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4245
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1594338
reference_id 1594338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1594338
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=902727
reference_id 902727
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=902727
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.8-3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12599
reference_id CVE-2018-12599
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12599
20
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
21
reference_url https://usn.ubuntu.com/3711-1/
reference_id USN-3711-1
reference_type
scores
url https://usn.ubuntu.com/3711-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-12599
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kd82-724m-77h8
25
url VCID-kxus-63yw-sufe
vulnerability_id VCID-kxus-63yw-sufe
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16413.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16413.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16413
reference_id
reference_type
scores
0
value 0.0035
scoring_system epss
scoring_elements 0.57376
published_at 2026-04-01T12:55:00Z
1
value 0.0035
scoring_system epss
scoring_elements 0.57459
published_at 2026-04-02T12:55:00Z
2
value 0.0035
scoring_system epss
scoring_elements 0.57481
published_at 2026-04-04T12:55:00Z
3
value 0.0035
scoring_system epss
scoring_elements 0.57458
published_at 2026-04-07T12:55:00Z
4
value 0.0035
scoring_system epss
scoring_elements 0.57511
published_at 2026-04-08T12:55:00Z
5
value 0.0035
scoring_system epss
scoring_elements 0.57515
published_at 2026-04-09T12:55:00Z
6
value 0.0035
scoring_system epss
scoring_elements 0.5753
published_at 2026-04-11T12:55:00Z
7
value 0.0035
scoring_system epss
scoring_elements 0.57507
published_at 2026-04-12T12:55:00Z
8
value 0.0035
scoring_system epss
scoring_elements 0.57489
published_at 2026-04-13T12:55:00Z
9
value 0.0035
scoring_system epss
scoring_elements 0.57516
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16413
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16412
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16413
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16642
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16645
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1625430
reference_id 1625430
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1625430
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910887
reference_id 910887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910887
10
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
11
reference_url https://usn.ubuntu.com/6980-1/
reference_id USN-6980-1
reference_type
scores
url https://usn.ubuntu.com/6980-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-16413
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kxus-63yw-sufe
26
url VCID-m31q-v2ue-zyh1
vulnerability_id VCID-m31q-v2ue-zyh1
summary ImageMagick: heap-buffer-overflow in ReadTIFFImage function in coders/tiff.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8960.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8960.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8960
reference_id
reference_type
scores
0
value 0.00288
scoring_system epss
scoring_elements 0.52305
published_at 2026-04-16T12:55:00Z
1
value 0.00288
scoring_system epss
scoring_elements 0.52266
published_at 2026-04-13T12:55:00Z
2
value 0.00377
scoring_system epss
scoring_elements 0.59191
published_at 2026-04-02T12:55:00Z
3
value 0.00377
scoring_system epss
scoring_elements 0.59215
published_at 2026-04-04T12:55:00Z
4
value 0.00377
scoring_system epss
scoring_elements 0.59179
published_at 2026-04-07T12:55:00Z
5
value 0.00377
scoring_system epss
scoring_elements 0.5923
published_at 2026-04-08T12:55:00Z
6
value 0.00377
scoring_system epss
scoring_elements 0.59244
published_at 2026-04-09T12:55:00Z
7
value 0.00377
scoring_system epss
scoring_elements 0.59263
published_at 2026-04-11T12:55:00Z
8
value 0.00377
scoring_system epss
scoring_elements 0.59246
published_at 2026-04-12T12:55:00Z
9
value 0.00377
scoring_system epss
scoring_elements 0.59117
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8960
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8960
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1561190
reference_id 1561190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1561190
5
reference_url https://usn.ubuntu.com/3681-1/
reference_id USN-3681-1
reference_type
scores
url https://usn.ubuntu.com/3681-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-8960
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m31q-v2ue-zyh1
27
url VCID-mcry-3vgm-kyh1
vulnerability_id VCID-mcry-3vgm-kyh1
summary ImageMagick: memory leak in DecodeImage in coders/pcd.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14435.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14435.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14435
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33366
published_at 2026-04-16T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33328
published_at 2026-04-13T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39367
published_at 2026-04-12T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39213
published_at 2026-04-01T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39386
published_at 2026-04-02T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.3941
published_at 2026-04-04T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39323
published_at 2026-04-07T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39378
published_at 2026-04-08T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39395
published_at 2026-04-09T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39407
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14435
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/ImageMagick/ImageMagick/issues/1193
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1193
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1609936
reference_id 1609936
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1609936
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-14435
reference_id CVE-2018-14435
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-14435
11
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
12
reference_url https://usn.ubuntu.com/3785-1/
reference_id USN-3785-1
reference_type
scores
url https://usn.ubuntu.com/3785-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-14435
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mcry-3vgm-kyh1
28
url VCID-n22y-f9az-fubm
vulnerability_id VCID-n22y-f9az-fubm
summary ImageMagick: Memory leak in the WritePSDChannel function in coders/psd.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7395.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7395.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-7395
reference_id
reference_type
scores
0
value 0.03348
scoring_system epss
scoring_elements 0.87264
published_at 2026-04-01T12:55:00Z
1
value 0.03348
scoring_system epss
scoring_elements 0.87331
published_at 2026-04-16T12:55:00Z
2
value 0.03348
scoring_system epss
scoring_elements 0.87327
published_at 2026-04-11T12:55:00Z
3
value 0.03348
scoring_system epss
scoring_elements 0.87321
published_at 2026-04-12T12:55:00Z
4
value 0.03348
scoring_system epss
scoring_elements 0.87317
published_at 2026-04-13T12:55:00Z
5
value 0.03348
scoring_system epss
scoring_elements 0.87274
published_at 2026-04-02T12:55:00Z
6
value 0.03348
scoring_system epss
scoring_elements 0.8729
published_at 2026-04-04T12:55:00Z
7
value 0.03348
scoring_system epss
scoring_elements 0.87288
published_at 2026-04-07T12:55:00Z
8
value 0.03348
scoring_system epss
scoring_elements 0.87307
published_at 2026-04-08T12:55:00Z
9
value 0.03348
scoring_system epss
scoring_elements 0.87314
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-7395
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
45
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
46
reference_url https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
47
reference_url https://github.com/ImageMagick/ImageMagick/issues/1451
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1451
48
reference_url https://www.debian.org/security/2020/dsa-4712
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4712
49
reference_url http://www.securityfocus.com/bid/106850
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106850
50
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1672576
reference_id 1672576
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1672576
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-7395
reference_id CVE-2019-7395
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-7395
59
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2019-7395
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n22y-f9az-fubm
29
url VCID-n59p-w7sh-sbhb
vulnerability_id VCID-n59p-w7sh-sbhb
summary ImageMagick: memory leak in coders/dcm.c:ReadDCImage can cause denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5357.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5357.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5357
reference_id
reference_type
scores
0
value 0.00655
scoring_system epss
scoring_elements 0.70929
published_at 2026-04-01T12:55:00Z
1
value 0.00655
scoring_system epss
scoring_elements 0.7094
published_at 2026-04-02T12:55:00Z
2
value 0.00655
scoring_system epss
scoring_elements 0.70958
published_at 2026-04-04T12:55:00Z
3
value 0.00655
scoring_system epss
scoring_elements 0.70933
published_at 2026-04-07T12:55:00Z
4
value 0.00655
scoring_system epss
scoring_elements 0.70975
published_at 2026-04-08T12:55:00Z
5
value 0.00655
scoring_system epss
scoring_elements 0.7099
published_at 2026-04-09T12:55:00Z
6
value 0.00655
scoring_system epss
scoring_elements 0.71013
published_at 2026-04-11T12:55:00Z
7
value 0.00655
scoring_system epss
scoring_elements 0.70998
published_at 2026-04-12T12:55:00Z
8
value 0.00655
scoring_system epss
scoring_elements 0.70981
published_at 2026-04-13T12:55:00Z
9
value 0.00655
scoring_system epss
scoring_elements 0.71027
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5357
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1534382
reference_id 1534382
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1534382
5
reference_url https://usn.ubuntu.com/3681-1/
reference_id USN-3681-1
reference_type
scores
url https://usn.ubuntu.com/3681-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-5357
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n59p-w7sh-sbhb
30
url VCID-nnmr-dnnk-qkc4
vulnerability_id VCID-nnmr-dnnk-qkc4
summary ImageMagick: Uninitialized variable in coders/mat.c:ReadMATImageV4() allows for memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14551.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14551.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14551
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.4947
published_at 2026-04-01T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.49567
published_at 2026-04-16T12:55:00Z
2
value 0.00262
scoring_system epss
scoring_elements 0.49547
published_at 2026-04-11T12:55:00Z
3
value 0.00262
scoring_system epss
scoring_elements 0.49518
published_at 2026-04-12T12:55:00Z
4
value 0.00262
scoring_system epss
scoring_elements 0.4952
published_at 2026-04-13T12:55:00Z
5
value 0.00262
scoring_system epss
scoring_elements 0.495
published_at 2026-04-02T12:55:00Z
6
value 0.00262
scoring_system epss
scoring_elements 0.49526
published_at 2026-04-04T12:55:00Z
7
value 0.00262
scoring_system epss
scoring_elements 0.49479
published_at 2026-04-07T12:55:00Z
8
value 0.00262
scoring_system epss
scoring_elements 0.49534
published_at 2026-04-08T12:55:00Z
9
value 0.00262
scoring_system epss
scoring_elements 0.4953
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14551
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14551
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/ImageMagick/ImageMagick/issues/1221
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1221
5
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610620
reference_id 1610620
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610620
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904713
reference_id 904713
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904713
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.8-7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-7:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-14551
reference_id CVE-2018-14551
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-14551
11
reference_url https://usn.ubuntu.com/3785-1/
reference_id USN-3785-1
reference_type
scores
url https://usn.ubuntu.com/3785-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-14551
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nnmr-dnnk-qkc4
31
url VCID-p3vh-b6jn-f3e2
vulnerability_id VCID-p3vh-b6jn-f3e2
summary ImageMagick: memory leak in SVGKeyValuePairs of coders/svg.c that leads to denial of service via crafted image file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10649.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10649.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10649
reference_id
reference_type
scores
0
value 0.00482
scoring_system epss
scoring_elements 0.65076
published_at 2026-04-01T12:55:00Z
1
value 0.00482
scoring_system epss
scoring_elements 0.65194
published_at 2026-04-16T12:55:00Z
2
value 0.00482
scoring_system epss
scoring_elements 0.65199
published_at 2026-04-11T12:55:00Z
3
value 0.00482
scoring_system epss
scoring_elements 0.65186
published_at 2026-04-12T12:55:00Z
4
value 0.00482
scoring_system epss
scoring_elements 0.65159
published_at 2026-04-13T12:55:00Z
5
value 0.00482
scoring_system epss
scoring_elements 0.65126
published_at 2026-04-02T12:55:00Z
6
value 0.00482
scoring_system epss
scoring_elements 0.65153
published_at 2026-04-04T12:55:00Z
7
value 0.00482
scoring_system epss
scoring_elements 0.65118
published_at 2026-04-07T12:55:00Z
8
value 0.00482
scoring_system epss
scoring_elements 0.65168
published_at 2026-04-08T12:55:00Z
9
value 0.00482
scoring_system epss
scoring_elements 0.65181
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10649
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
43
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
44
reference_url https://github.com/ImageMagick/ImageMagick/issues/1533
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1533
45
reference_url https://www.debian.org/security/2020/dsa-4712
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4712
46
reference_url http://www.securityfocus.com/bid/107645
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107645
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1700417
reference_id 1700417
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1700417
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-36:q16:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.8-36:q16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-36:q16:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10649
reference_id CVE-2019-10649
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-10649
55
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2019-10649
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p3vh-b6jn-f3e2
32
url VCID-rhpj-r7ym-7kdn
vulnerability_id VCID-rhpj-r7ym-7kdn
summary ImageMagick: Memory leak in coders/dcm.c:ReadDCMImage can allow for denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6405.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6405.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6405
reference_id
reference_type
scores
0
value 0.00836
scoring_system epss
scoring_elements 0.74681
published_at 2026-04-16T12:55:00Z
1
value 0.00987
scoring_system epss
scoring_elements 0.76783
published_at 2026-04-01T12:55:00Z
2
value 0.00987
scoring_system epss
scoring_elements 0.76787
published_at 2026-04-02T12:55:00Z
3
value 0.00987
scoring_system epss
scoring_elements 0.76816
published_at 2026-04-04T12:55:00Z
4
value 0.00987
scoring_system epss
scoring_elements 0.76796
published_at 2026-04-07T12:55:00Z
5
value 0.00987
scoring_system epss
scoring_elements 0.76827
published_at 2026-04-08T12:55:00Z
6
value 0.00987
scoring_system epss
scoring_elements 0.76837
published_at 2026-04-09T12:55:00Z
7
value 0.00987
scoring_system epss
scoring_elements 0.76866
published_at 2026-04-11T12:55:00Z
8
value 0.00987
scoring_system epss
scoring_elements 0.76846
published_at 2026-04-12T12:55:00Z
9
value 0.00987
scoring_system epss
scoring_elements 0.76841
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6405
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1541866
reference_id 1541866
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1541866
5
reference_url https://usn.ubuntu.com/3681-1/
reference_id USN-3681-1
reference_type
scores
url https://usn.ubuntu.com/3681-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-6405
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rhpj-r7ym-7kdn
33
url VCID-ryu7-2nsu-kqf6
vulnerability_id VCID-ryu7-2nsu-kqf6
summary ImageMagick: infinite loop in coders/bmp.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20467.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20467.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20467
reference_id
reference_type
scores
0
value 0.00374
scoring_system epss
scoring_elements 0.58982
published_at 2026-04-01T12:55:00Z
1
value 0.00374
scoring_system epss
scoring_elements 0.59117
published_at 2026-04-16T12:55:00Z
2
value 0.00374
scoring_system epss
scoring_elements 0.591
published_at 2026-04-12T12:55:00Z
3
value 0.00374
scoring_system epss
scoring_elements 0.59118
published_at 2026-04-11T12:55:00Z
4
value 0.00374
scoring_system epss
scoring_elements 0.59081
published_at 2026-04-13T12:55:00Z
5
value 0.00374
scoring_system epss
scoring_elements 0.59057
published_at 2026-04-02T12:55:00Z
6
value 0.00374
scoring_system epss
scoring_elements 0.59079
published_at 2026-04-04T12:55:00Z
7
value 0.00374
scoring_system epss
scoring_elements 0.59044
published_at 2026-04-07T12:55:00Z
8
value 0.00374
scoring_system epss
scoring_elements 0.59095
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20467
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20467
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/ImageMagick/ImageMagick/commit/db0add932fb850d762b02604ca3053b7d7ab6deb
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/commit/db0add932fb850d762b02604ca3053b7d7ab6deb
7
reference_url https://github.com/ImageMagick/ImageMagick/issues/1408
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1408
8
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html
9
reference_url http://www.securityfocus.com/bid/106315
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106315
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1664845
reference_id 1664845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1664845
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917326
reference_id 917326
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917326
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20467
reference_id CVE-2018-20467
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20467
20
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
21
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
22
reference_url https://usn.ubuntu.com/6980-1/
reference_id USN-6980-1
reference_type
scores
url https://usn.ubuntu.com/6980-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-20467
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ryu7-2nsu-kqf6
34
url VCID-szhs-nysy-6bap
vulnerability_id VCID-szhs-nysy-6bap
summary ImageMagick: memory leak for a colormap in WriteMPCImage in coders/mpc.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14434.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14434
reference_id
reference_type
scores
0
value 0.00148
scoring_system epss
scoring_elements 0.35293
published_at 2026-04-16T12:55:00Z
1
value 0.00148
scoring_system epss
scoring_elements 0.35255
published_at 2026-04-13T12:55:00Z
2
value 0.00193
scoring_system epss
scoring_elements 0.41274
published_at 2026-04-12T12:55:00Z
3
value 0.00193
scoring_system epss
scoring_elements 0.41181
published_at 2026-04-01T12:55:00Z
4
value 0.00193
scoring_system epss
scoring_elements 0.41273
published_at 2026-04-02T12:55:00Z
5
value 0.00193
scoring_system epss
scoring_elements 0.41302
published_at 2026-04-04T12:55:00Z
6
value 0.00193
scoring_system epss
scoring_elements 0.41226
published_at 2026-04-07T12:55:00Z
7
value 0.00193
scoring_system epss
scoring_elements 0.41277
published_at 2026-04-08T12:55:00Z
8
value 0.00193
scoring_system epss
scoring_elements 0.41284
published_at 2026-04-09T12:55:00Z
9
value 0.00193
scoring_system epss
scoring_elements 0.41306
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/ImageMagick/ImageMagick/issues/1192
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1192
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1609933
reference_id 1609933
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1609933
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-14434
reference_id CVE-2018-14434
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-14434
11
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
12
reference_url https://usn.ubuntu.com/3785-1/
reference_id USN-3785-1
reference_type
scores
url https://usn.ubuntu.com/3785-1/
13
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-14434
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-szhs-nysy-6bap
35
url VCID-tnnn-bg52-93a9
vulnerability_id VCID-tnnn-bg52-93a9
summary ImageMagick: memory leak in WritePCXImage in coders/pcx.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18016.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18016.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18016
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24688
published_at 2026-04-01T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24765
published_at 2026-04-02T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24803
published_at 2026-04-04T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24576
published_at 2026-04-07T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24645
published_at 2026-04-08T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24692
published_at 2026-04-09T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24707
published_at 2026-04-11T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24666
published_at 2026-04-12T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24609
published_at 2026-04-13T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24623
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18016
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1636579
reference_id 1636579
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1636579
5
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
6
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
7
reference_url https://usn.ubuntu.com/6980-1/
reference_id USN-6980-1
reference_type
scores
url https://usn.ubuntu.com/6980-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-18016
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tnnn-bg52-93a9
36
url VCID-twq8-ntkg-zbfk
vulnerability_id VCID-twq8-ntkg-zbfk
summary ImageMagick: Memory leak in the WriteDIBImage function in coders/dib.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7398.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7398.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-7398
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.46977
published_at 2026-04-01T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.47091
published_at 2026-04-16T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.47054
published_at 2026-04-11T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.47028
published_at 2026-04-12T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.47035
published_at 2026-04-13T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.47013
published_at 2026-04-02T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.47032
published_at 2026-04-04T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.46979
published_at 2026-04-07T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.47034
published_at 2026-04-08T12:55:00Z
9
value 0.00239
scoring_system epss
scoring_elements 0.4703
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-7398
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
45
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
46
reference_url https://github.com/ImageMagick/ImageMagick/issues/1453
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1453
47
reference_url https://www.debian.org/security/2020/dsa-4712
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4712
48
reference_url http://www.securityfocus.com/bid/106848
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106848
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1672560
reference_id 1672560
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1672560
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-7398
reference_id CVE-2019-7398
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-7398
58
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
59
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
60
reference_url https://usn.ubuntu.com/7068-1/
reference_id USN-7068-1
reference_type
scores
url https://usn.ubuntu.com/7068-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2019-7398
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-twq8-ntkg-zbfk
37
url VCID-tzpa-13fk-7kc9
vulnerability_id VCID-tzpa-13fk-7kc9
summary ImageMagick: missing check for fputc function in multiple files
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16643.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16643
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56509
published_at 2026-04-01T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56606
published_at 2026-04-07T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56627
published_at 2026-04-04T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56657
published_at 2026-04-08T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56662
published_at 2026-04-09T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56671
published_at 2026-04-11T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56646
published_at 2026-04-12T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56625
published_at 2026-04-13T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56656
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16643
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16643
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1626599
reference_id 1626599
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1626599
5
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
6
reference_url https://usn.ubuntu.com/3785-1/
reference_id USN-3785-1
reference_type
scores
url https://usn.ubuntu.com/3785-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-16643
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tzpa-13fk-7kc9
38
url VCID-u9v8-n717-fyag
vulnerability_id VCID-u9v8-n717-fyag
summary ImageMagick: infinite loop in the ReadBMPImage function of the coders/bmp.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18024.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18024.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18024
reference_id
reference_type
scores
0
value 0.00321
scoring_system epss
scoring_elements 0.5503
published_at 2026-04-01T12:55:00Z
1
value 0.00321
scoring_system epss
scoring_elements 0.55131
published_at 2026-04-02T12:55:00Z
2
value 0.00321
scoring_system epss
scoring_elements 0.55155
published_at 2026-04-04T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.5513
published_at 2026-04-07T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.5518
published_at 2026-04-09T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55191
published_at 2026-04-11T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55172
published_at 2026-04-12T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55154
published_at 2026-04-13T12:55:00Z
8
value 0.00321
scoring_system epss
scoring_elements 0.55193
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18024
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18024
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1637189
reference_id 1637189
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1637189
5
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
6
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
7
reference_url https://usn.ubuntu.com/6980-1/
reference_id USN-6980-1
reference_type
scores
url https://usn.ubuntu.com/6980-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-18024
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9v8-n717-fyag
39
url VCID-umnw-ksa8-9ua8
vulnerability_id VCID-umnw-ksa8-9ua8
summary ImageMagick: excessive iteration in the DecodeLabImage and EncodeLabImage functions in coders/tiff.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-9133.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-9133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-9133
reference_id
reference_type
scores
0
value 0.00265
scoring_system epss
scoring_elements 0.5003
published_at 2026-04-16T12:55:00Z
1
value 0.00265
scoring_system epss
scoring_elements 0.49985
published_at 2026-04-13T12:55:00Z
2
value 0.00347
scoring_system epss
scoring_elements 0.57245
published_at 2026-04-07T12:55:00Z
3
value 0.00347
scoring_system epss
scoring_elements 0.57268
published_at 2026-04-04T12:55:00Z
4
value 0.00347
scoring_system epss
scoring_elements 0.57297
published_at 2026-04-08T12:55:00Z
5
value 0.00347
scoring_system epss
scoring_elements 0.573
published_at 2026-04-09T12:55:00Z
6
value 0.00347
scoring_system epss
scoring_elements 0.57312
published_at 2026-04-11T12:55:00Z
7
value 0.00347
scoring_system epss
scoring_elements 0.57293
published_at 2026-04-12T12:55:00Z
8
value 0.00347
scoring_system epss
scoring_elements 0.57156
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-9133
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9133
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1563875
reference_id 1563875
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1563875
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894848
reference_id 894848
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894848
6
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
7
reference_url https://usn.ubuntu.com/3681-1/
reference_id USN-3681-1
reference_type
scores
url https://usn.ubuntu.com/3681-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-9133
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-umnw-ksa8-9ua8
40
url VCID-uwbu-vzay-q3ak
vulnerability_id VCID-uwbu-vzay-q3ak
summary ImageMagick: NULL pointer dereference in GetMagickProperty function in MagickCore/property.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16329.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16329.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16329
reference_id
reference_type
scores
0
value 0.00372
scoring_system epss
scoring_elements 0.58869
published_at 2026-04-01T12:55:00Z
1
value 0.00372
scoring_system epss
scoring_elements 0.58944
published_at 2026-04-02T12:55:00Z
2
value 0.00372
scoring_system epss
scoring_elements 0.58967
published_at 2026-04-04T12:55:00Z
3
value 0.00372
scoring_system epss
scoring_elements 0.58933
published_at 2026-04-07T12:55:00Z
4
value 0.00372
scoring_system epss
scoring_elements 0.58985
published_at 2026-04-08T12:55:00Z
5
value 0.00372
scoring_system epss
scoring_elements 0.5899
published_at 2026-04-09T12:55:00Z
6
value 0.00372
scoring_system epss
scoring_elements 0.5901
published_at 2026-04-11T12:55:00Z
7
value 0.00372
scoring_system epss
scoring_elements 0.58991
published_at 2026-04-12T12:55:00Z
8
value 0.00372
scoring_system epss
scoring_elements 0.58973
published_at 2026-04-13T12:55:00Z
9
value 0.00372
scoring_system epss
scoring_elements 0.59007
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16329
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1624957
reference_id 1624957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1624957
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-16329
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uwbu-vzay-q3ak
41
url VCID-vbgc-23c4-77hu
vulnerability_id VCID-vbgc-23c4-77hu
summary ImageMagick: memory leak in parse8BIM in coders/meta.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14437.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14437.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14437
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33305
published_at 2026-04-01T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33366
published_at 2026-04-16T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33392
published_at 2026-04-11T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33351
published_at 2026-04-12T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33328
published_at 2026-04-13T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33441
published_at 2026-04-02T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33472
published_at 2026-04-04T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.3331
published_at 2026-04-07T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33356
published_at 2026-04-08T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33389
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14437
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/ImageMagick/ImageMagick/issues/1190
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1190
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1609942
reference_id 1609942
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1609942
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-4:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-14437
reference_id CVE-2018-14437
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-14437
11
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
12
reference_url https://usn.ubuntu.com/3785-1/
reference_id USN-3785-1
reference_type
scores
url https://usn.ubuntu.com/3785-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-14437
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbgc-23c4-77hu
42
url VCID-vdum-127b-qfbq
vulnerability_id VCID-vdum-127b-qfbq
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9956.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9956.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9956
reference_id
reference_type
scores
0
value 0.00789
scoring_system epss
scoring_elements 0.73816
published_at 2026-04-01T12:55:00Z
1
value 0.00789
scoring_system epss
scoring_elements 0.73905
published_at 2026-04-16T12:55:00Z
2
value 0.00789
scoring_system epss
scoring_elements 0.73868
published_at 2026-04-09T12:55:00Z
3
value 0.00789
scoring_system epss
scoring_elements 0.7389
published_at 2026-04-11T12:55:00Z
4
value 0.00789
scoring_system epss
scoring_elements 0.73871
published_at 2026-04-12T12:55:00Z
5
value 0.00789
scoring_system epss
scoring_elements 0.73863
published_at 2026-04-13T12:55:00Z
6
value 0.00789
scoring_system epss
scoring_elements 0.73825
published_at 2026-04-02T12:55:00Z
7
value 0.00789
scoring_system epss
scoring_elements 0.7385
published_at 2026-04-04T12:55:00Z
8
value 0.00789
scoring_system epss
scoring_elements 0.7382
published_at 2026-04-07T12:55:00Z
9
value 0.00789
scoring_system epss
scoring_elements 0.73855
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9956
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10650
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9956
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/ImageMagick/ImageMagick/issues/1523
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1523
8
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
9
reference_url https://seclists.org/bugtraq/2019/Apr/37
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Apr/37
10
reference_url https://www.debian.org/security/2019/dsa-4436
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4436
11
reference_url http://www.securityfocus.com/bid/107546
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107546
12
reference_url http://www.securityfocus.com/bid/107672
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107672
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1692300
reference_id 1692300
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1692300
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925395
reference_id 925395
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925395
15
reference_url https://security.archlinux.org/ASA-201903-15
reference_id ASA-201903-15
reference_type
scores
url https://security.archlinux.org/ASA-201903-15
16
reference_url https://security.archlinux.org/AVG-931
reference_id AVG-931
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-931
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:q16:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:q16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:q16:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9956
reference_id CVE-2019-9956
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9956
20
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
21
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
22
reference_url https://usn.ubuntu.com/7068-1/
reference_id USN-7068-1
reference_type
scores
url https://usn.ubuntu.com/7068-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2019-9956
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vdum-127b-qfbq
43
url VCID-wwxb-6psb-xybx
vulnerability_id VCID-wwxb-6psb-xybx
summary ImageMagick: heap-based buffer over-read in the EncodeImage function of coders/pict.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18025.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18025.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18025
reference_id
reference_type
scores
0
value 0.00208
scoring_system epss
scoring_elements 0.43115
published_at 2026-04-01T12:55:00Z
1
value 0.00208
scoring_system epss
scoring_elements 0.43173
published_at 2026-04-02T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.43201
published_at 2026-04-04T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43138
published_at 2026-04-07T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.4319
published_at 2026-04-08T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43203
published_at 2026-04-09T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43224
published_at 2026-04-11T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43191
published_at 2026-04-12T12:55:00Z
8
value 0.00208
scoring_system epss
scoring_elements 0.43175
published_at 2026-04-13T12:55:00Z
9
value 0.00208
scoring_system epss
scoring_elements 0.43236
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18025
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18025
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1637191
reference_id 1637191
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1637191
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911435
reference_id 911435
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911435
6
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
7
reference_url https://usn.ubuntu.com/6980-1/
reference_id USN-6980-1
reference_type
scores
url https://usn.ubuntu.com/6980-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2018-18025
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wwxb-6psb-xybx
44
url VCID-x95w-ad3j-n7aj
vulnerability_id VCID-x95w-ad3j-n7aj
summary ImageMagick: Memory leak in the ReadSIXELImage function in coders/sixel.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7396.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7396.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-7396
reference_id
reference_type
scores
0
value 0.03348
scoring_system epss
scoring_elements 0.87264
published_at 2026-04-01T12:55:00Z
1
value 0.03348
scoring_system epss
scoring_elements 0.87331
published_at 2026-04-16T12:55:00Z
2
value 0.03348
scoring_system epss
scoring_elements 0.87327
published_at 2026-04-11T12:55:00Z
3
value 0.03348
scoring_system epss
scoring_elements 0.87321
published_at 2026-04-12T12:55:00Z
4
value 0.03348
scoring_system epss
scoring_elements 0.87317
published_at 2026-04-13T12:55:00Z
5
value 0.03348
scoring_system epss
scoring_elements 0.87274
published_at 2026-04-02T12:55:00Z
6
value 0.03348
scoring_system epss
scoring_elements 0.8729
published_at 2026-04-04T12:55:00Z
7
value 0.03348
scoring_system epss
scoring_elements 0.87288
published_at 2026-04-07T12:55:00Z
8
value 0.03348
scoring_system epss
scoring_elements 0.87307
published_at 2026-04-08T12:55:00Z
9
value 0.03348
scoring_system epss
scoring_elements 0.87314
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-7396
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
44
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
45
reference_url https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/commit/748a03651e5b138bcaf160d15133de2f4b1b89ce
46
reference_url https://github.com/ImageMagick/ImageMagick/issues/1452
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1452
47
reference_url https://www.debian.org/security/2020/dsa-4712
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4712
48
reference_url http://www.securityfocus.com/bid/106849
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106849
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1672567
reference_id 1672567
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1672567
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-7396
reference_id CVE-2019-7396
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-7396
58
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2019-7396
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x95w-ad3j-n7aj
45
url VCID-z7e5-pt2s-x3a5
vulnerability_id VCID-z7e5-pt2s-x3a5
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10650.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10650.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10650
reference_id
reference_type
scores
0
value 0.00493
scoring_system epss
scoring_elements 0.65597
published_at 2026-04-01T12:55:00Z
1
value 0.00493
scoring_system epss
scoring_elements 0.65717
published_at 2026-04-16T12:55:00Z
2
value 0.00493
scoring_system epss
scoring_elements 0.65726
published_at 2026-04-11T12:55:00Z
3
value 0.00493
scoring_system epss
scoring_elements 0.65711
published_at 2026-04-12T12:55:00Z
4
value 0.00493
scoring_system epss
scoring_elements 0.65682
published_at 2026-04-13T12:55:00Z
5
value 0.00493
scoring_system epss
scoring_elements 0.65646
published_at 2026-04-02T12:55:00Z
6
value 0.00493
scoring_system epss
scoring_elements 0.65675
published_at 2026-04-04T12:55:00Z
7
value 0.00493
scoring_system epss
scoring_elements 0.65641
published_at 2026-04-07T12:55:00Z
8
value 0.00493
scoring_system epss
scoring_elements 0.65692
published_at 2026-04-08T12:55:00Z
9
value 0.00493
scoring_system epss
scoring_elements 0.65704
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10650
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10650
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9956
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/ImageMagick/ImageMagick/issues/1532
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1532
8
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
9
reference_url https://seclists.org/bugtraq/2019/Apr/37
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Apr/37
10
reference_url https://www.debian.org/security/2019/dsa-4436
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4436
11
reference_url http://www.securityfocus.com/bid/107646
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107646
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1700755
reference_id 1700755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1700755
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926091
reference_id 926091
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926091
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-36:q16:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.8-36:q16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-36:q16:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10650
reference_id CVE-2019-10650
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-10650
17
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
18
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
19
reference_url https://usn.ubuntu.com/6985-1/
reference_id USN-6985-1
reference_type
scores
url https://usn.ubuntu.com/6985-1/
fixed_packages
0
url pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/imagemagick6@6.9.10.37-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2019-10650
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7e5-pt2s-x3a5
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/imagemagick6@6.9.10.37-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community