Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
Typedeb
Namespacedebian
Namegraphicsmagick
Version1.4+really1.3.45+hg17696-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.4+really1.3.46-2
Latest_non_vulnerable_version1.4+really1.3.46-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1223-kpm6-2fh6
vulnerability_id VCID-1223-kpm6-2fh6
summary
Multiple vulnerabilities have been found in ImageMagick, the worst
    of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00041.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00041.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html
7
reference_url http://packetstormsecurity.com/files/152364/ImageTragick-ImageMagick-Proof-Of-Concepts.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://packetstormsecurity.com/files/152364/ImageTragick-ImageMagick-Proof-Of-Concepts.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-0726.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://rhn.redhat.com/errata/RHSA-2016-0726.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3714.json
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3714.json
10
reference_url https://access.redhat.com/security/vulnerabilities/2296071
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url https://access.redhat.com/security/vulnerabilities/2296071
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3714
reference_id
reference_type
scores
0
value 0.93579
scoring_system epss
scoring_elements 0.99832
published_at 2026-04-13T12:55:00Z
1
value 0.93749
scoring_system epss
scoring_elements 0.99853
published_at 2026-04-16T12:55:00Z
2
value 0.93765
scoring_system epss
scoring_elements 0.99853
published_at 2026-04-07T12:55:00Z
3
value 0.93765
scoring_system epss
scoring_elements 0.99854
published_at 2026-04-04T12:55:00Z
4
value 0.93765
scoring_system epss
scoring_elements 0.99852
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3714
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
30
reference_url https://imagetragick.com/
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url https://imagetragick.com/
31
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3714
reference_id
reference_type
scores
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3714
32
reference_url https://www.exploit-db.com/exploits/39767/
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url https://www.exploit-db.com/exploits/39767/
33
reference_url https://www.exploit-db.com/exploits/39791/
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url https://www.exploit-db.com/exploits/39791/
34
reference_url https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
35
reference_url https://www.imagemagick.org/script/changelog.php
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url https://www.imagemagick.org/script/changelog.php
36
reference_url https://www.kb.cert.org/vuls/id/250519
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url https://www.kb.cert.org/vuls/id/250519
37
reference_url http://www.debian.org/security/2016/dsa-3580
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://www.debian.org/security/2016/dsa-3580
38
reference_url http://www.debian.org/security/2016/dsa-3746
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://www.debian.org/security/2016/dsa-3746
39
reference_url http://www.openwall.com/lists/oss-security/2016/05/03/13
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://www.openwall.com/lists/oss-security/2016/05/03/13
40
reference_url http://www.openwall.com/lists/oss-security/2016/05/03/18
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://www.openwall.com/lists/oss-security/2016/05/03/18
41
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
42
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
43
reference_url http://www.rapid7.com/db/modules/exploit/unix/fileformat/imagemagick_delegate
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://www.rapid7.com/db/modules/exploit/unix/fileformat/imagemagick_delegate
44
reference_url http://www.securityfocus.com/archive/1/538378/100/0/threaded
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://www.securityfocus.com/archive/1/538378/100/0/threaded
45
reference_url http://www.securityfocus.com/bid/89848
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://www.securityfocus.com/bid/89848
46
reference_url http://www.securitytracker.com/id/1035742
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://www.securitytracker.com/id/1035742
47
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
48
reference_url http://www.ubuntu.com/usn/USN-2990-1
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url http://www.ubuntu.com/usn/USN-2990-1
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1332492
reference_id 1332492
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1332492
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
62
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/39791.rb
reference_id CVE-2016-3714
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/39791.rb
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3714
reference_id CVE-2016-3714
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3714
64
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39767.txt
reference_id CVE-2016-3718;CVE-2016-3717;CVE-2016-3716;CVE-2016-3715;CVE-2016-3714
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39767.txt
65
reference_url https://security.gentoo.org/glsa/201611-21
reference_id GLSA-201611-21
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-09-07T03:55:20Z/
url https://security.gentoo.org/glsa/201611-21
66
reference_url https://access.redhat.com/errata/RHSA-2016:0726
reference_id RHSA-2016:0726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0726
67
reference_url https://usn.ubuntu.com/2990-1/
reference_id USN-2990-1
reference_type
scores
url https://usn.ubuntu.com/2990-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.24-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-3714
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1223-kpm6-2fh6
1
url VCID-12mr-p56j-mbg2
vulnerability_id VCID-12mr-p56j-mbg2
summary Buffer overflow in the MVG and SVG rendering code in GraphicsMagick 1.3.24 allows remote attackers to have unspecified impact via unknown vectors. Note: This vulnerability exists due to an incomplete patch for CVE-2016-2317.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7446
reference_id
reference_type
scores
0
value 0.03159
scoring_system epss
scoring_elements 0.86932
published_at 2026-04-16T12:55:00Z
1
value 0.03159
scoring_system epss
scoring_elements 0.86861
published_at 2026-04-01T12:55:00Z
2
value 0.03159
scoring_system epss
scoring_elements 0.86871
published_at 2026-04-02T12:55:00Z
3
value 0.03159
scoring_system epss
scoring_elements 0.8689
published_at 2026-04-04T12:55:00Z
4
value 0.03159
scoring_system epss
scoring_elements 0.86885
published_at 2026-04-07T12:55:00Z
5
value 0.03159
scoring_system epss
scoring_elements 0.86905
published_at 2026-04-08T12:55:00Z
6
value 0.03159
scoring_system epss
scoring_elements 0.86913
published_at 2026-04-09T12:55:00Z
7
value 0.03159
scoring_system epss
scoring_elements 0.86925
published_at 2026-04-11T12:55:00Z
8
value 0.03159
scoring_system epss
scoring_elements 0.86921
published_at 2026-04-12T12:55:00Z
9
value 0.03159
scoring_system epss
scoring_elements 0.86916
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7446
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7446
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7446
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.25-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.25-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-7446
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-12mr-p56j-mbg2
2
url VCID-15mv-khzp-fqfk
vulnerability_id VCID-15mv-khzp-fqfk
summary ImageMagick: memory leak in WriteMSLImage of coders/msl.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18544.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18544.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18544
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35516
published_at 2026-04-01T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35718
published_at 2026-04-02T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35743
published_at 2026-04-04T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35624
published_at 2026-04-07T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.3567
published_at 2026-04-08T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35693
published_at 2026-04-09T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35703
published_at 2026-04-11T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35658
published_at 2026-04-12T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35636
published_at 2026-04-13T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35675
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18544
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642614
reference_id 1642614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642614
5
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
6
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.31-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.31-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.31-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2018-18544
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-15mv-khzp-fqfk
3
url VCID-1hfa-9cbc-yfch
vulnerability_id VCID-1hfa-9cbc-yfch
summary The ReadJNGImage and ReadOneJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 do not properly manage image pointers after certain error conditions, which allows remote attackers to conduct use-after-free attacks via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-11403.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14103
reference_id
reference_type
scores
0
value 0.019
scoring_system epss
scoring_elements 0.83265
published_at 2026-04-16T12:55:00Z
1
value 0.019
scoring_system epss
scoring_elements 0.83229
published_at 2026-04-13T12:55:00Z
2
value 0.019
scoring_system epss
scoring_elements 0.83163
published_at 2026-04-01T12:55:00Z
3
value 0.019
scoring_system epss
scoring_elements 0.8318
published_at 2026-04-02T12:55:00Z
4
value 0.019
scoring_system epss
scoring_elements 0.83193
published_at 2026-04-04T12:55:00Z
5
value 0.019
scoring_system epss
scoring_elements 0.83192
published_at 2026-04-07T12:55:00Z
6
value 0.019
scoring_system epss
scoring_elements 0.83216
published_at 2026-04-08T12:55:00Z
7
value 0.019
scoring_system epss
scoring_elements 0.83223
published_at 2026-04-09T12:55:00Z
8
value 0.019
scoring_system epss
scoring_elements 0.83239
published_at 2026-04-11T12:55:00Z
9
value 0.019
scoring_system epss
scoring_elements 0.83234
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14103
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14103
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-8?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-8%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-14103
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1hfa-9cbc-yfch
4
url VCID-1m2c-fyc2-2qf3
vulnerability_id VCID-1m2c-fyc2-2qf3
summary In GraphicsMagick 1.4 snapshot-20181209 Q8 on 32-bit platforms, there is a heap-based buffer over-read in the ReadBMPImage function of bmp.c, which allows attackers to cause a denial of service via a crafted bmp image file. This only affects GraphicsMagick installations with customized BMP limits.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20185
reference_id
reference_type
scores
0
value 0.00846
scoring_system epss
scoring_elements 0.74853
published_at 2026-04-16T12:55:00Z
1
value 0.00846
scoring_system epss
scoring_elements 0.74773
published_at 2026-04-01T12:55:00Z
2
value 0.00846
scoring_system epss
scoring_elements 0.74776
published_at 2026-04-02T12:55:00Z
3
value 0.00846
scoring_system epss
scoring_elements 0.74804
published_at 2026-04-04T12:55:00Z
4
value 0.00846
scoring_system epss
scoring_elements 0.74777
published_at 2026-04-07T12:55:00Z
5
value 0.00846
scoring_system epss
scoring_elements 0.7481
published_at 2026-04-08T12:55:00Z
6
value 0.00846
scoring_system epss
scoring_elements 0.74824
published_at 2026-04-09T12:55:00Z
7
value 0.00846
scoring_system epss
scoring_elements 0.74848
published_at 2026-04-11T12:55:00Z
8
value 0.00846
scoring_system epss
scoring_elements 0.74827
published_at 2026-04-12T12:55:00Z
9
value 0.00846
scoring_system epss
scoring_elements 0.74818
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20185
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20185
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916719
reference_id 916719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916719
4
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg15880-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg15880-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg15880-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2018-20185
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1m2c-fyc2-2qf3
5
url VCID-1nhm-pwhd-pygh
vulnerability_id VCID-1nhm-pwhd-pygh
summary magick/render.c in GraphicsMagick before 1.3.24 allows remote attackers to cause a denial of service (arithmetic exception and application crash) via a crafted svg file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5241
reference_id
reference_type
scores
0
value 0.00354
scoring_system epss
scoring_elements 0.57783
published_at 2026-04-16T12:55:00Z
1
value 0.00354
scoring_system epss
scoring_elements 0.57644
published_at 2026-04-01T12:55:00Z
2
value 0.00354
scoring_system epss
scoring_elements 0.57729
published_at 2026-04-02T12:55:00Z
3
value 0.00354
scoring_system epss
scoring_elements 0.5775
published_at 2026-04-04T12:55:00Z
4
value 0.00354
scoring_system epss
scoring_elements 0.57723
published_at 2026-04-07T12:55:00Z
5
value 0.00354
scoring_system epss
scoring_elements 0.57778
published_at 2026-04-08T12:55:00Z
6
value 0.00354
scoring_system epss
scoring_elements 0.5778
published_at 2026-04-09T12:55:00Z
7
value 0.00354
scoring_system epss
scoring_elements 0.57796
published_at 2026-04-11T12:55:00Z
8
value 0.00354
scoring_system epss
scoring_elements 0.57774
published_at 2026-04-12T12:55:00Z
9
value 0.00354
scoring_system epss
scoring_elements 0.57754
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5241
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5241
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.24-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-5241
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1nhm-pwhd-pygh
6
url VCID-2a2h-yk41-qybt
vulnerability_id VCID-2a2h-yk41-qybt
summary
Multiple vulnerabilities have been found in ImageMagick, the worst
    of which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13134.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13134.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13134
reference_id
reference_type
scores
0
value 0.00779
scoring_system epss
scoring_elements 0.73697
published_at 2026-04-16T12:55:00Z
1
value 0.00779
scoring_system epss
scoring_elements 0.73662
published_at 2026-04-12T12:55:00Z
2
value 0.00779
scoring_system epss
scoring_elements 0.73653
published_at 2026-04-13T12:55:00Z
3
value 0.01351
scoring_system epss
scoring_elements 0.80123
published_at 2026-04-11T12:55:00Z
4
value 0.01351
scoring_system epss
scoring_elements 0.80051
published_at 2026-04-01T12:55:00Z
5
value 0.01351
scoring_system epss
scoring_elements 0.80058
published_at 2026-04-02T12:55:00Z
6
value 0.01351
scoring_system epss
scoring_elements 0.80079
published_at 2026-04-04T12:55:00Z
7
value 0.01351
scoring_system epss
scoring_elements 0.80068
published_at 2026-04-07T12:55:00Z
8
value 0.01351
scoring_system epss
scoring_elements 0.80096
published_at 2026-04-08T12:55:00Z
9
value 0.01351
scoring_system epss
scoring_elements 0.80104
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13134
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
73
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
74
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1486779
reference_id 1486779
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1486779
75
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873099
reference_id 873099
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873099
76
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881524
reference_id 881524
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881524
77
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
78
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
79
reference_url https://security.archlinux.org/AVG-497
reference_id AVG-497
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-497
80
reference_url https://security.gentoo.org/glsa/201711-07
reference_id GLSA-201711-07
reference_type
scores
url https://security.gentoo.org/glsa/201711-07
81
reference_url https://usn.ubuntu.com/3681-1/
reference_id USN-3681-1
reference_type
scores
url https://usn.ubuntu.com/3681-1/
82
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-19?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-19?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-19%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-13134
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2a2h-yk41-qybt
7
url VCID-2e5h-jf8c-dudp
vulnerability_id VCID-2e5h-jf8c-dudp
summary coders/xwd.c in GraphicsMagick 1.3.31 allows attackers to cause a denial of service (out-of-bounds read and application crash) by crafting an XWD image file, a different vulnerability than CVE-2019-11008 and CVE-2019-11009.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11473
reference_id
reference_type
scores
0
value 0.01274
scoring_system epss
scoring_elements 0.79481
published_at 2026-04-01T12:55:00Z
1
value 0.01274
scoring_system epss
scoring_elements 0.79488
published_at 2026-04-02T12:55:00Z
2
value 0.01274
scoring_system epss
scoring_elements 0.79511
published_at 2026-04-04T12:55:00Z
3
value 0.01274
scoring_system epss
scoring_elements 0.79497
published_at 2026-04-07T12:55:00Z
4
value 0.01274
scoring_system epss
scoring_elements 0.79525
published_at 2026-04-08T12:55:00Z
5
value 0.01274
scoring_system epss
scoring_elements 0.79533
published_at 2026-04-09T12:55:00Z
6
value 0.01274
scoring_system epss
scoring_elements 0.79555
published_at 2026-04-11T12:55:00Z
7
value 0.01274
scoring_system epss
scoring_elements 0.79538
published_at 2026-04-12T12:55:00Z
8
value 0.01274
scoring_system epss
scoring_elements 0.79529
published_at 2026-04-13T12:55:00Z
9
value 0.01274
scoring_system epss
scoring_elements 0.7956
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11473
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11473
2
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg15976-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg15976-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg15976-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-11473
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2e5h-jf8c-dudp
8
url VCID-2f66-aukm-nyb3
vulnerability_id VCID-2f66-aukm-nyb3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5240.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5240.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5240
reference_id
reference_type
scores
0
value 0.01408
scoring_system epss
scoring_elements 0.80512
published_at 2026-04-16T12:55:00Z
1
value 0.01408
scoring_system epss
scoring_elements 0.80431
published_at 2026-04-01T12:55:00Z
2
value 0.01408
scoring_system epss
scoring_elements 0.80437
published_at 2026-04-02T12:55:00Z
3
value 0.01408
scoring_system epss
scoring_elements 0.80458
published_at 2026-04-04T12:55:00Z
4
value 0.01408
scoring_system epss
scoring_elements 0.80447
published_at 2026-04-07T12:55:00Z
5
value 0.01408
scoring_system epss
scoring_elements 0.80477
published_at 2026-04-08T12:55:00Z
6
value 0.01408
scoring_system epss
scoring_elements 0.80487
published_at 2026-04-09T12:55:00Z
7
value 0.01408
scoring_system epss
scoring_elements 0.80505
published_at 2026-04-11T12:55:00Z
8
value 0.01408
scoring_system epss
scoring_elements 0.8049
published_at 2026-04-12T12:55:00Z
9
value 0.01408
scoring_system epss
scoring_elements 0.80483
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5240
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333417
reference_id 1333417
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333417
18
reference_url https://access.redhat.com/errata/RHSA-2016:1237
reference_id RHSA-2016:1237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1237
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.24-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-5240
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2f66-aukm-nyb3
9
url VCID-35a9-mz4g-zkf2
vulnerability_id VCID-35a9-mz4g-zkf2
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2317
reference_id
reference_type
scores
0
value 0.00248
scoring_system epss
scoring_elements 0.48101
published_at 2026-04-16T12:55:00Z
1
value 0.00248
scoring_system epss
scoring_elements 0.47981
published_at 2026-04-01T12:55:00Z
2
value 0.00248
scoring_system epss
scoring_elements 0.48019
published_at 2026-04-02T12:55:00Z
3
value 0.00248
scoring_system epss
scoring_elements 0.4804
published_at 2026-04-04T12:55:00Z
4
value 0.00248
scoring_system epss
scoring_elements 0.47989
published_at 2026-04-07T12:55:00Z
5
value 0.00248
scoring_system epss
scoring_elements 0.48042
published_at 2026-04-08T12:55:00Z
6
value 0.00248
scoring_system epss
scoring_elements 0.48036
published_at 2026-04-09T12:55:00Z
7
value 0.00248
scoring_system epss
scoring_elements 0.4806
published_at 2026-04-11T12:55:00Z
8
value 0.00248
scoring_system epss
scoring_elements 0.48037
published_at 2026-04-12T12:55:00Z
9
value 0.00248
scoring_system epss
scoring_elements 0.48048
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2317
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=814732
reference_id 814732
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=814732
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.24-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-2317
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35a9-mz4g-zkf2
10
url VCID-3cn6-jf51-3qdv
vulnerability_id VCID-3cn6-jf51-3qdv
summary
Multiple vulnerabilities have been discovered in ImageMagick, possibly
    resulting in arbitrary code execution or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4985.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4985.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4985
reference_id
reference_type
scores
0
value 0.0277
scoring_system epss
scoring_elements 0.8597
published_at 2026-04-01T12:55:00Z
1
value 0.0277
scoring_system epss
scoring_elements 0.85982
published_at 2026-04-02T12:55:00Z
2
value 0.0277
scoring_system epss
scoring_elements 0.85998
published_at 2026-04-04T12:55:00Z
3
value 0.0277
scoring_system epss
scoring_elements 0.85997
published_at 2026-04-07T12:55:00Z
4
value 0.0277
scoring_system epss
scoring_elements 0.86017
published_at 2026-04-08T12:55:00Z
5
value 0.0277
scoring_system epss
scoring_elements 0.86027
published_at 2026-04-09T12:55:00Z
6
value 0.0277
scoring_system epss
scoring_elements 0.86041
published_at 2026-04-11T12:55:00Z
7
value 0.0277
scoring_system epss
scoring_elements 0.86039
published_at 2026-04-12T12:55:00Z
8
value 0.0277
scoring_system epss
scoring_elements 0.86034
published_at 2026-04-13T12:55:00Z
9
value 0.0277
scoring_system epss
scoring_elements 0.86051
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4985
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=310091
reference_id 310091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=310091
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444266
reference_id 444266
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444266
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444267
reference_id 444267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444267
6
reference_url https://security.gentoo.org/glsa/200710-27
reference_id GLSA-200710-27
reference_type
scores
url https://security.gentoo.org/glsa/200710-27
7
reference_url https://access.redhat.com/errata/RHSA-2008:0145
reference_id RHSA-2008:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0145
8
reference_url https://access.redhat.com/errata/RHSA-2008:0165
reference_id RHSA-2008:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0165
9
reference_url https://usn.ubuntu.com/523-1/
reference_id USN-523-1
reference_type
scores
url https://usn.ubuntu.com/523-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.11-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.11-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2007-4985
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3cn6-jf51-3qdv
11
url VCID-3gxd-j2ak-63hx
vulnerability_id VCID-3gxd-j2ak-63hx
summary GraphicsMagick: Memory leak in CloneImage function in magick/image.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13066.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13066
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.43058
published_at 2026-04-01T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43181
published_at 2026-04-16T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43169
published_at 2026-04-11T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.43136
published_at 2026-04-12T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.43121
published_at 2026-04-13T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43116
published_at 2026-04-02T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43144
published_at 2026-04-04T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.43082
published_at 2026-04-07T12:55:00Z
8
value 0.00207
scoring_system epss
scoring_elements 0.43135
published_at 2026-04-08T12:55:00Z
9
value 0.00207
scoring_system epss
scoring_elements 0.43148
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13066
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13066
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1484491
reference_id 1484491
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1484491
5
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
6
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-13066
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3gxd-j2ak-63hx
12
url VCID-3qad-mewf-8khz
vulnerability_id VCID-3qad-mewf-8khz
summary ImageMagick: Memory leak in the WritePDFImage function in coders/pdf.c
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7397.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7397.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-7397
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.51521
published_at 2026-04-01T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.51662
published_at 2026-04-16T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.51658
published_at 2026-04-11T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.51637
published_at 2026-04-12T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.5162
published_at 2026-04-13T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51572
published_at 2026-04-02T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.51598
published_at 2026-04-04T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.51559
published_at 2026-04-07T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51613
published_at 2026-04-08T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.51609
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-7397
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
48
reference_url https://github.com/ImageMagick/ImageMagick/issues/1454
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1454
49
reference_url https://www.debian.org/security/2020/dsa-4712
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4712
50
reference_url http://www.securityfocus.com/bid/106847
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106847
51
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1672564
reference_id 1672564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1672564
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-7397
reference_id CVE-2019-7397
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-7397
61
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
62
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
63
reference_url https://usn.ubuntu.com/7068-1/
reference_id USN-7068-1
reference_type
scores
url https://usn.ubuntu.com/7068-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg15896-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg15896-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg15896-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-7397
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qad-mewf-8khz
13
url VCID-3tbg-j6gv-9ub8
vulnerability_id VCID-3tbg-j6gv-9ub8
summary Multiple vulnerabilities have been discovered in GraphicsMagick, the worst of which are fuzzing issues presumed to allow for arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1270
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15959
published_at 2026-04-01T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.16023
published_at 2026-04-02T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.16085
published_at 2026-04-04T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15881
published_at 2026-04-07T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15967
published_at 2026-04-08T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.1603
published_at 2026-04-09T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.16008
published_at 2026-04-11T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15969
published_at 2026-04-12T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15901
published_at 2026-04-13T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15826
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1270
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1270
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://sourceforge.net/p/graphicsmagick/bugs/664/
reference_id 664
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T14:58:47Z/
url https://sourceforge.net/p/graphicsmagick/bugs/664/
4
reference_url https://www.debian.org/security/2022/dsa-5288
reference_id dsa-5288
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T14:58:47Z/
url https://www.debian.org/security/2022/dsa-5288
5
reference_url https://security.gentoo.org/glsa/202209-19
reference_id GLSA-202209-19
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T14:58:47Z/
url https://security.gentoo.org/glsa/202209-19
6
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T14:58:47Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00028.html
7
reference_url https://usn.ubuntu.com/5974-1/
reference_id USN-5974-1
reference_type
scores
url https://usn.ubuntu.com/5974-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.38-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.38-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.38-1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2022-1270
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3tbg-j6gv-9ub8
14
url VCID-3uf9-ajrz-yfa4
vulnerability_id VCID-3uf9-ajrz-yfa4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12936
reference_id
reference_type
scores
0
value 0.01407
scoring_system epss
scoring_elements 0.80502
published_at 2026-04-16T12:55:00Z
1
value 0.019
scoring_system epss
scoring_elements 0.8319
published_at 2026-04-07T12:55:00Z
2
value 0.019
scoring_system epss
scoring_elements 0.83238
published_at 2026-04-11T12:55:00Z
3
value 0.019
scoring_system epss
scoring_elements 0.83232
published_at 2026-04-12T12:55:00Z
4
value 0.019
scoring_system epss
scoring_elements 0.83228
published_at 2026-04-13T12:55:00Z
5
value 0.019
scoring_system epss
scoring_elements 0.83178
published_at 2026-04-02T12:55:00Z
6
value 0.019
scoring_system epss
scoring_elements 0.83192
published_at 2026-04-04T12:55:00Z
7
value 0.019
scoring_system epss
scoring_elements 0.83162
published_at 2026-04-01T12:55:00Z
8
value 0.019
scoring_system epss
scoring_elements 0.83215
published_at 2026-04-08T12:55:00Z
9
value 0.019
scoring_system epss
scoring_elements 0.83222
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12936
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872575
reference_id 872575
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872575
59
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
60
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
61
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-6?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-6%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-12936
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3uf9-ajrz-yfa4
15
url VCID-471x-bevu-duas
vulnerability_id VCID-471x-bevu-duas
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18229.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18229.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18229
reference_id
reference_type
scores
0
value 0.01274
scoring_system epss
scoring_elements 0.79483
published_at 2026-04-01T12:55:00Z
1
value 0.01274
scoring_system epss
scoring_elements 0.7949
published_at 2026-04-02T12:55:00Z
2
value 0.01274
scoring_system epss
scoring_elements 0.79513
published_at 2026-04-04T12:55:00Z
3
value 0.01274
scoring_system epss
scoring_elements 0.79499
published_at 2026-04-07T12:55:00Z
4
value 0.01274
scoring_system epss
scoring_elements 0.79527
published_at 2026-04-08T12:55:00Z
5
value 0.01274
scoring_system epss
scoring_elements 0.79535
published_at 2026-04-09T12:55:00Z
6
value 0.01274
scoring_system epss
scoring_elements 0.79557
published_at 2026-04-11T12:55:00Z
7
value 0.01274
scoring_system epss
scoring_elements 0.7954
published_at 2026-04-12T12:55:00Z
8
value 0.01274
scoring_system epss
scoring_elements 0.79531
published_at 2026-04-13T12:55:00Z
9
value 0.01274
scoring_system epss
scoring_elements 0.79561
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18229
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1558749
reference_id 1558749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1558749
60
reference_url https://usn.ubuntu.com/4266-1/
reference_id USN-4266-1
reference_type
scores
url https://usn.ubuntu.com/4266-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-18229
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-471x-bevu-duas
16
url VCID-4b2b-e9ug-hff2
vulnerability_id VCID-4b2b-e9ug-hff2
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11641
reference_id
reference_type
scores
0
value 0.00451
scoring_system epss
scoring_elements 0.63702
published_at 2026-04-16T12:55:00Z
1
value 0.00451
scoring_system epss
scoring_elements 0.63666
published_at 2026-04-13T12:55:00Z
2
value 0.00451
scoring_system epss
scoring_elements 0.63588
published_at 2026-04-01T12:55:00Z
3
value 0.00451
scoring_system epss
scoring_elements 0.63647
published_at 2026-04-02T12:55:00Z
4
value 0.00451
scoring_system epss
scoring_elements 0.63673
published_at 2026-04-04T12:55:00Z
5
value 0.00451
scoring_system epss
scoring_elements 0.63632
published_at 2026-04-07T12:55:00Z
6
value 0.00451
scoring_system epss
scoring_elements 0.63684
published_at 2026-04-08T12:55:00Z
7
value 0.00451
scoring_system epss
scoring_elements 0.637
published_at 2026-04-12T12:55:00Z
8
value 0.00451
scoring_system epss
scoring_elements 0.63714
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11641
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870155
reference_id 870155
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870155
59
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-4?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-4%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-11641
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4b2b-e9ug-hff2
17
url VCID-4cez-xrag-9khe
vulnerability_id VCID-4cez-xrag-9khe
summary security update
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=60932931559a
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=60932931559a
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17783
reference_id
reference_type
scores
0
value 0.00458
scoring_system epss
scoring_elements 0.6403
published_at 2026-04-16T12:55:00Z
1
value 0.00458
scoring_system epss
scoring_elements 0.63995
published_at 2026-04-13T12:55:00Z
2
value 0.00458
scoring_system epss
scoring_elements 0.63913
published_at 2026-04-01T12:55:00Z
3
value 0.00458
scoring_system epss
scoring_elements 0.63971
published_at 2026-04-02T12:55:00Z
4
value 0.00458
scoring_system epss
scoring_elements 0.63999
published_at 2026-04-04T12:55:00Z
5
value 0.00458
scoring_system epss
scoring_elements 0.63959
published_at 2026-04-07T12:55:00Z
6
value 0.00458
scoring_system epss
scoring_elements 0.64009
published_at 2026-04-08T12:55:00Z
7
value 0.00458
scoring_system epss
scoring_elements 0.64026
published_at 2026-04-09T12:55:00Z
8
value 0.00458
scoring_system epss
scoring_elements 0.64038
published_at 2026-04-11T12:55:00Z
9
value 0.00458
scoring_system epss
scoring_elements 0.64024
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17783
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://sourceforge.net/p/graphicsmagick/bugs/529/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/529/
59
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
60
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884904
reference_id 884904
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884904
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27a:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17783
reference_id CVE-2017-17783
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17783
64
reference_url https://usn.ubuntu.com/4248-1/
reference_id USN-4248-1
reference_type
scores
url https://usn.ubuntu.com/4248-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-2%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-17783
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4cez-xrag-9khe
18
url VCID-4hvn-sg6y-s7bq
vulnerability_id VCID-4hvn-sg6y-s7bq
summary security update
references
0
reference_url ftp://ftp.graphicsmagick.org/pub/GraphicsMagick/snapshots/ChangeLog.txt
reference_id
reference_type
scores
url ftp://ftp.graphicsmagick.org/pub/GraphicsMagick/snapshots/ChangeLog.txt
1
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=7292230dd185
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=7292230dd185
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16352.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16352.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16352
reference_id
reference_type
scores
0
value 0.3137
scoring_system epss
scoring_elements 0.96746
published_at 2026-04-01T12:55:00Z
1
value 0.3137
scoring_system epss
scoring_elements 0.96781
published_at 2026-04-16T12:55:00Z
2
value 0.3137
scoring_system epss
scoring_elements 0.96769
published_at 2026-04-08T12:55:00Z
3
value 0.3137
scoring_system epss
scoring_elements 0.9677
published_at 2026-04-09T12:55:00Z
4
value 0.3137
scoring_system epss
scoring_elements 0.96773
published_at 2026-04-12T12:55:00Z
5
value 0.3137
scoring_system epss
scoring_elements 0.96775
published_at 2026-04-13T12:55:00Z
6
value 0.3137
scoring_system epss
scoring_elements 0.96756
published_at 2026-04-02T12:55:00Z
7
value 0.3137
scoring_system epss
scoring_elements 0.96758
published_at 2026-04-04T12:55:00Z
8
value 0.3137
scoring_system epss
scoring_elements 0.96761
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16352
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
60
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
61
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00002.html
62
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
63
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
64
reference_url https://www.exploit-db.com/exploits/43111/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/43111/
65
reference_url http://www.securityfocus.com/bid/101658
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101658
66
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1512043
reference_id 1512043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1512043
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16352
reference_id CVE-2017-16352
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16352
72
reference_url https://blogs.securiteam.com/index.php/archives/3494
reference_id CVE-2017-16353;CVE-2017-16352
reference_type exploit
scores
url https://blogs.securiteam.com/index.php/archives/3494
73
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/43111.py
reference_id CVE-2017-16353;CVE-2017-16352
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/43111.py
74
reference_url https://usn.ubuntu.com/4232-1/
reference_id USN-4232-1
reference_type
scores
url https://usn.ubuntu.com/4232-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-17?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-17?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-17%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-16352
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4hvn-sg6y-s7bq
19
url VCID-4nsq-h8ab-5kcj
vulnerability_id VCID-4nsq-h8ab-5kcj
summary
Multiple vulnerabilities have been found in ImageMagick, the worst
    of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0726.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://rhn.redhat.com/errata/RHSA-2016-0726.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3715.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3715.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3715
reference_id
reference_type
scores
0
value 0.77733
scoring_system epss
scoring_elements 0.98987
published_at 2026-04-01T12:55:00Z
1
value 0.77733
scoring_system epss
scoring_elements 0.98988
published_at 2026-04-02T12:55:00Z
2
value 0.77733
scoring_system epss
scoring_elements 0.98991
published_at 2026-04-04T12:55:00Z
3
value 0.77733
scoring_system epss
scoring_elements 0.98993
published_at 2026-04-07T12:55:00Z
4
value 0.77733
scoring_system epss
scoring_elements 0.98994
published_at 2026-04-09T12:55:00Z
5
value 0.77733
scoring_system epss
scoring_elements 0.98996
published_at 2026-04-11T12:55:00Z
6
value 0.77733
scoring_system epss
scoring_elements 0.98997
published_at 2026-04-13T12:55:00Z
7
value 0.77733
scoring_system epss
scoring_elements 0.98998
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3715
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
27
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3715
reference_id
reference_type
scores
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3715
28
reference_url https://www.exploit-db.com/exploits/39767/
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url https://www.exploit-db.com/exploits/39767/
29
reference_url https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
30
reference_url https://www.imagemagick.org/script/changelog.php
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url https://www.imagemagick.org/script/changelog.php
31
reference_url http://www.debian.org/security/2016/dsa-3580
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://www.debian.org/security/2016/dsa-3580
32
reference_url http://www.debian.org/security/2016/dsa-3746
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://www.debian.org/security/2016/dsa-3746
33
reference_url http://www.openwall.com/lists/oss-security/2016/05/03/18
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://www.openwall.com/lists/oss-security/2016/05/03/18
34
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
35
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
36
reference_url http://www.securityfocus.com/archive/1/538378/100/0/threaded
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://www.securityfocus.com/archive/1/538378/100/0/threaded
37
reference_url http://www.securityfocus.com/bid/89852
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://www.securityfocus.com/bid/89852
38
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
39
reference_url http://www.ubuntu.com/usn/USN-2990-1
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url http://www.ubuntu.com/usn/USN-2990-1
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1332500
reference_id 1332500
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1332500
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3715
reference_id CVE-2016-3715
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-3715
126
reference_url https://security.gentoo.org/glsa/201611-21
reference_id GLSA-201611-21
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:17Z/
url https://security.gentoo.org/glsa/201611-21
127
reference_url https://access.redhat.com/errata/RHSA-2016:0726
reference_id RHSA-2016:0726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0726
128
reference_url https://usn.ubuntu.com/2990-1/
reference_id USN-2990-1
reference_type
scores
url https://usn.ubuntu.com/2990-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.24-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-3715
risk_score 10.0
exploitability 2.0
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4nsq-h8ab-5kcj
20
url VCID-4pd9-uv1z-6qfx
vulnerability_id VCID-4pd9-uv1z-6qfx
summary In GraphicsMagick from version 1.3.30 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WriteMATLABImage of coders/mat.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to ExportRedQuantumType in magick/export.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11506
reference_id
reference_type
scores
0
value 0.01488
scoring_system epss
scoring_elements 0.80983
published_at 2026-04-01T12:55:00Z
1
value 0.01488
scoring_system epss
scoring_elements 0.80992
published_at 2026-04-02T12:55:00Z
2
value 0.01488
scoring_system epss
scoring_elements 0.81015
published_at 2026-04-04T12:55:00Z
3
value 0.01488
scoring_system epss
scoring_elements 0.81014
published_at 2026-04-07T12:55:00Z
4
value 0.01488
scoring_system epss
scoring_elements 0.81042
published_at 2026-04-08T12:55:00Z
5
value 0.01488
scoring_system epss
scoring_elements 0.81049
published_at 2026-04-09T12:55:00Z
6
value 0.01488
scoring_system epss
scoring_elements 0.81066
published_at 2026-04-11T12:55:00Z
7
value 0.01488
scoring_system epss
scoring_elements 0.81053
published_at 2026-04-12T12:55:00Z
8
value 0.01488
scoring_system epss
scoring_elements 0.81045
published_at 2026-04-13T12:55:00Z
9
value 0.01488
scoring_system epss
scoring_elements 0.81083
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11506
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11506
2
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg15968-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-11506
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4pd9-uv1z-6qfx
21
url VCID-4qbq-95vy-k7bv
vulnerability_id VCID-4qbq-95vy-k7bv
summary CVE-2007-0770: GraphicsMagick buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0770.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0770.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0770
reference_id
reference_type
scores
0
value 0.07123
scoring_system epss
scoring_elements 0.91563
published_at 2026-04-16T12:55:00Z
1
value 0.07123
scoring_system epss
scoring_elements 0.91498
published_at 2026-04-01T12:55:00Z
2
value 0.07123
scoring_system epss
scoring_elements 0.91504
published_at 2026-04-02T12:55:00Z
3
value 0.07123
scoring_system epss
scoring_elements 0.9151
published_at 2026-04-04T12:55:00Z
4
value 0.07123
scoring_system epss
scoring_elements 0.91518
published_at 2026-04-07T12:55:00Z
5
value 0.07123
scoring_system epss
scoring_elements 0.91531
published_at 2026-04-08T12:55:00Z
6
value 0.07123
scoring_system epss
scoring_elements 0.91537
published_at 2026-04-09T12:55:00Z
7
value 0.07123
scoring_system epss
scoring_elements 0.91541
published_at 2026-04-13T12:55:00Z
8
value 0.07123
scoring_system epss
scoring_elements 0.91543
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0770
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0770
3
reference_url http://secunia.com/advisories/24167
reference_id
reference_type
scores
url http://secunia.com/advisories/24167
4
reference_url http://secunia.com/advisories/24196
reference_id
reference_type
scores
url http://secunia.com/advisories/24196
5
reference_url https://issues.rpath.com/browse/RPL-1034
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1034
6
reference_url http://www.debian.org/security/2007/dsa-1260
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1260
7
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:041
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:041
8
reference_url http://www.novell.com/linux/security/advisories/2007_3_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_3_sr.html
9
reference_url http://www.osvdb.org/31911
reference_id
reference_type
scores
url http://www.osvdb.org/31911
10
reference_url http://www.securityfocus.com/archive/1/459507/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/459507/100/0/threaded
11
reference_url http://www.ubuntu.com/usn/usn-422-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-422-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=228758
reference_id 228758
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=228758
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=410435
reference_id 410435
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=410435
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0770
reference_id CVE-2007-0770
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-0770
17
reference_url https://usn.ubuntu.com/422-1/
reference_id USN-422-1
reference_type
scores
url https://usn.ubuntu.com/422-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.7-12?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.7-12?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.7-12%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2007-0770
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qbq-95vy-k7bv
22
url VCID-4rmq-cwn8-ruac
vulnerability_id VCID-4rmq-cwn8-ruac
summary
Multiple vulnerabilities have been found in GraphicsMagick,
    allowing remote attackers to execute arbitrary code or cause a Denial of
    Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4589
reference_id
reference_type
scores
0
value 0.02548
scoring_system epss
scoring_elements 0.85406
published_at 2026-04-01T12:55:00Z
1
value 0.02548
scoring_system epss
scoring_elements 0.85419
published_at 2026-04-02T12:55:00Z
2
value 0.02548
scoring_system epss
scoring_elements 0.85439
published_at 2026-04-04T12:55:00Z
3
value 0.02548
scoring_system epss
scoring_elements 0.85442
published_at 2026-04-07T12:55:00Z
4
value 0.02548
scoring_system epss
scoring_elements 0.85463
published_at 2026-04-08T12:55:00Z
5
value 0.02548
scoring_system epss
scoring_elements 0.85471
published_at 2026-04-09T12:55:00Z
6
value 0.02548
scoring_system epss
scoring_elements 0.85485
published_at 2026-04-11T12:55:00Z
7
value 0.02548
scoring_system epss
scoring_elements 0.85484
published_at 2026-04-12T12:55:00Z
8
value 0.02548
scoring_system epss
scoring_elements 0.8548
published_at 2026-04-13T12:55:00Z
9
value 0.02548
scoring_system epss
scoring_elements 0.85504
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4589
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4589
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729661
reference_id 729661
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729661
3
reference_url https://security.gentoo.org/glsa/201311-10
reference_id GLSA-201311-10
reference_type
scores
url https://security.gentoo.org/glsa/201311-10
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.18-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.18-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.18-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2013-4589
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4rmq-cwn8-ruac
23
url VCID-4zqu-dbmr-mkab
vulnerability_id VCID-4zqu-dbmr-mkab
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6799
reference_id
reference_type
scores
0
value 0.00781
scoring_system epss
scoring_elements 0.73743
published_at 2026-04-16T12:55:00Z
1
value 0.00781
scoring_system epss
scoring_elements 0.73652
published_at 2026-04-01T12:55:00Z
2
value 0.00781
scoring_system epss
scoring_elements 0.73661
published_at 2026-04-02T12:55:00Z
3
value 0.00781
scoring_system epss
scoring_elements 0.73685
published_at 2026-04-04T12:55:00Z
4
value 0.00781
scoring_system epss
scoring_elements 0.73658
published_at 2026-04-07T12:55:00Z
5
value 0.00781
scoring_system epss
scoring_elements 0.73693
published_at 2026-04-08T12:55:00Z
6
value 0.00781
scoring_system epss
scoring_elements 0.73706
published_at 2026-04-09T12:55:00Z
7
value 0.00781
scoring_system epss
scoring_elements 0.73728
published_at 2026-04-11T12:55:00Z
8
value 0.00781
scoring_system epss
scoring_elements 0.7371
published_at 2026-04-12T12:55:00Z
9
value 0.00781
scoring_system epss
scoring_elements 0.73701
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6799
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.28-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.28-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.28-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2018-6799
risk_score 0.7
exploitability 0.5
weighted_severity 1.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4zqu-dbmr-mkab
24
url VCID-57gy-x8vb-zqde
vulnerability_id VCID-57gy-x8vb-zqde
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7996
reference_id
reference_type
scores
0
value 0.01164
scoring_system epss
scoring_elements 0.78643
published_at 2026-04-16T12:55:00Z
1
value 0.01164
scoring_system epss
scoring_elements 0.78564
published_at 2026-04-01T12:55:00Z
2
value 0.01164
scoring_system epss
scoring_elements 0.78571
published_at 2026-04-02T12:55:00Z
3
value 0.01164
scoring_system epss
scoring_elements 0.78602
published_at 2026-04-04T12:55:00Z
4
value 0.01164
scoring_system epss
scoring_elements 0.78584
published_at 2026-04-07T12:55:00Z
5
value 0.01164
scoring_system epss
scoring_elements 0.78609
published_at 2026-04-08T12:55:00Z
6
value 0.01164
scoring_system epss
scoring_elements 0.78615
published_at 2026-04-09T12:55:00Z
7
value 0.01164
scoring_system epss
scoring_elements 0.7864
published_at 2026-04-11T12:55:00Z
8
value 0.01164
scoring_system epss
scoring_elements 0.78621
published_at 2026-04-12T12:55:00Z
9
value 0.01164
scoring_system epss
scoring_elements 0.78614
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7996
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.21-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.21-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.21-2%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-7996
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-57gy-x8vb-zqde
25
url VCID-5ce6-hsnh-5qe1
vulnerability_id VCID-5ce6-hsnh-5qe1
summary security update
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=8e3d2264109c
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=8e3d2264109c
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17782
reference_id
reference_type
scores
0
value 0.00659
scoring_system epss
scoring_elements 0.71118
published_at 2026-04-16T12:55:00Z
1
value 0.00659
scoring_system epss
scoring_elements 0.71103
published_at 2026-04-11T12:55:00Z
2
value 0.00659
scoring_system epss
scoring_elements 0.71088
published_at 2026-04-12T12:55:00Z
3
value 0.00659
scoring_system epss
scoring_elements 0.71071
published_at 2026-04-13T12:55:00Z
4
value 0.00659
scoring_system epss
scoring_elements 0.71021
published_at 2026-04-01T12:55:00Z
5
value 0.00659
scoring_system epss
scoring_elements 0.7103
published_at 2026-04-02T12:55:00Z
6
value 0.00659
scoring_system epss
scoring_elements 0.71048
published_at 2026-04-04T12:55:00Z
7
value 0.00659
scoring_system epss
scoring_elements 0.71023
published_at 2026-04-07T12:55:00Z
8
value 0.00659
scoring_system epss
scoring_elements 0.71065
published_at 2026-04-08T12:55:00Z
9
value 0.00659
scoring_system epss
scoring_elements 0.7108
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17782
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
60
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
61
reference_url https://sourceforge.net/p/graphicsmagick/bugs/530/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/530/
62
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
63
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884905
reference_id 884905
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884905
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27a:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17782
reference_id CVE-2017-17782
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17782
69
reference_url https://usn.ubuntu.com/4248-1/
reference_id USN-4248-1
reference_type
scores
url https://usn.ubuntu.com/4248-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-2%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-17782
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ce6-hsnh-5qe1
26
url VCID-5ejx-vfmd-7fh8
vulnerability_id VCID-5ejx-vfmd-7fh8
summary In GraphicsMagick 1.3.26, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13648
reference_id
reference_type
scores
0
value 0.00429
scoring_system epss
scoring_elements 0.6252
published_at 2026-04-16T12:55:00Z
1
value 0.00429
scoring_system epss
scoring_elements 0.62478
published_at 2026-04-13T12:55:00Z
2
value 0.00429
scoring_system epss
scoring_elements 0.62369
published_at 2026-04-01T12:55:00Z
3
value 0.00429
scoring_system epss
scoring_elements 0.62428
published_at 2026-04-02T12:55:00Z
4
value 0.00429
scoring_system epss
scoring_elements 0.62458
published_at 2026-04-04T12:55:00Z
5
value 0.00429
scoring_system epss
scoring_elements 0.62425
published_at 2026-04-07T12:55:00Z
6
value 0.00429
scoring_system epss
scoring_elements 0.62476
published_at 2026-04-08T12:55:00Z
7
value 0.00429
scoring_system epss
scoring_elements 0.62492
published_at 2026-04-09T12:55:00Z
8
value 0.00429
scoring_system epss
scoring_elements 0.62511
published_at 2026-04-11T12:55:00Z
9
value 0.00429
scoring_system epss
scoring_elements 0.625
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13648
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13648
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-13648
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ejx-vfmd-7fh8
27
url VCID-5sxs-wpy9-rqfn
vulnerability_id VCID-5sxs-wpy9-rqfn
summary
Multiple vulnerabilities have been discovered in ImageMagick, possibly
    resulting in arbitrary code execution or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4988.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4988.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4988
reference_id
reference_type
scores
0
value 0.02298
scoring_system epss
scoring_elements 0.84657
published_at 2026-04-01T12:55:00Z
1
value 0.02298
scoring_system epss
scoring_elements 0.84672
published_at 2026-04-02T12:55:00Z
2
value 0.02298
scoring_system epss
scoring_elements 0.84693
published_at 2026-04-04T12:55:00Z
3
value 0.02298
scoring_system epss
scoring_elements 0.84695
published_at 2026-04-07T12:55:00Z
4
value 0.02298
scoring_system epss
scoring_elements 0.84717
published_at 2026-04-08T12:55:00Z
5
value 0.02298
scoring_system epss
scoring_elements 0.84724
published_at 2026-04-09T12:55:00Z
6
value 0.02298
scoring_system epss
scoring_elements 0.84742
published_at 2026-04-11T12:55:00Z
7
value 0.02298
scoring_system epss
scoring_elements 0.84737
published_at 2026-04-12T12:55:00Z
8
value 0.02298
scoring_system epss
scoring_elements 0.84731
published_at 2026-04-13T12:55:00Z
9
value 0.02298
scoring_system epss
scoring_elements 0.84752
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4988
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=310081
reference_id 310081
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=310081
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444266
reference_id 444266
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444266
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444267
reference_id 444267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444267
6
reference_url https://security.gentoo.org/glsa/200710-27
reference_id GLSA-200710-27
reference_type
scores
url https://security.gentoo.org/glsa/200710-27
7
reference_url https://access.redhat.com/errata/RHSA-2008:0145
reference_id RHSA-2008:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0145
8
reference_url https://usn.ubuntu.com/523-1/
reference_id USN-523-1
reference_type
scores
url https://usn.ubuntu.com/523-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.11-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.11-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2007-4988
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5sxs-wpy9-rqfn
28
url VCID-5um7-kjwx-a7ft
vulnerability_id VCID-5um7-kjwx-a7ft
summary Buffer Overflow vulnerability in WritePCXImage function in pcx.c in GraphicsMagick 1.4 allows remote attackers to cause a denial of service via converting of crafted image file to pcx format.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-21679
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.30275
published_at 2026-04-16T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30401
published_at 2026-04-02T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30372
published_at 2026-04-01T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30446
published_at 2026-04-04T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30255
published_at 2026-04-07T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30314
published_at 2026-04-08T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30349
published_at 2026-04-09T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30353
published_at 2026-04-11T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30308
published_at 2026-04-12T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30261
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-21679
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21679
2
reference_url https://sourceforge.net/p/graphicsmagick/bugs/619/
reference_id 619
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:14:19Z/
url https://sourceforge.net/p/graphicsmagick/bugs/619/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.34%2Bhg16181-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.34%2Bhg16181-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.34%252Bhg16181-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2020-21679
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5um7-kjwx-a7ft
29
url VCID-67zs-1sfm-mbgn
vulnerability_id VCID-67zs-1sfm-mbgn
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5685
reference_id
reference_type
scores
0
value 0.00812
scoring_system epss
scoring_elements 0.7429
published_at 2026-04-16T12:55:00Z
1
value 0.00812
scoring_system epss
scoring_elements 0.74205
published_at 2026-04-01T12:55:00Z
2
value 0.00812
scoring_system epss
scoring_elements 0.7421
published_at 2026-04-07T12:55:00Z
3
value 0.00812
scoring_system epss
scoring_elements 0.74237
published_at 2026-04-04T12:55:00Z
4
value 0.00812
scoring_system epss
scoring_elements 0.74242
published_at 2026-04-08T12:55:00Z
5
value 0.00812
scoring_system epss
scoring_elements 0.74257
published_at 2026-04-09T12:55:00Z
6
value 0.00812
scoring_system epss
scoring_elements 0.74279
published_at 2026-04-11T12:55:00Z
7
value 0.00812
scoring_system epss
scoring_elements 0.74259
published_at 2026-04-12T12:55:00Z
8
value 0.00812
scoring_system epss
scoring_elements 0.74252
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5685
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887158
reference_id 887158
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887158
59
reference_url https://usn.ubuntu.com/5974-1/
reference_id USN-5974-1
reference_type
scores
url https://usn.ubuntu.com/5974-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-4?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-4%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2018-5685
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-67zs-1sfm-mbgn
30
url VCID-6hay-bjuv-nygd
vulnerability_id VCID-6hay-bjuv-nygd
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15277.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15277.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15277
reference_id
reference_type
scores
0
value 0.50442
scoring_system epss
scoring_elements 0.97822
published_at 2026-04-01T12:55:00Z
1
value 0.50442
scoring_system epss
scoring_elements 0.97827
published_at 2026-04-02T12:55:00Z
2
value 0.50442
scoring_system epss
scoring_elements 0.97829
published_at 2026-04-04T12:55:00Z
3
value 0.50442
scoring_system epss
scoring_elements 0.97832
published_at 2026-04-07T12:55:00Z
4
value 0.50442
scoring_system epss
scoring_elements 0.97836
published_at 2026-04-08T12:55:00Z
5
value 0.59286
scoring_system epss
scoring_elements 0.98244
published_at 2026-04-16T12:55:00Z
6
value 0.59286
scoring_system epss
scoring_elements 0.98235
published_at 2026-04-09T12:55:00Z
7
value 0.59286
scoring_system epss
scoring_elements 0.98238
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15277
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
73
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
74
reference_url https://github.com/ImageMagick/ImageMagick/commit/9fd10cf630832b36a588c1545d8736539b2f1fb5
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/commit/9fd10cf630832b36a588c1545d8736539b2f1fb5
75
reference_url https://github.com/ImageMagick/ImageMagick/issues/592
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/592
76
reference_url https://github.com/neex/gifoeb
reference_id
reference_type
scores
url https://github.com/neex/gifoeb
77
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
78
reference_url https://www.debian.org/security/2017/dsa-4032
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4032
79
reference_url https://www.debian.org/security/2017/dsa-4040
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4040
80
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
81
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1510426
reference_id 1510426
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1510426
82
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878578
reference_id 878578
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878578
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.6-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.6-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.6-1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15277
reference_id CVE-2017-15277
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-15277
86
reference_url https://usn.ubuntu.com/3681-1/
reference_id USN-3681-1
reference_type
scores
url https://usn.ubuntu.com/3681-1/
87
reference_url https://usn.ubuntu.com/4232-1/
reference_id USN-4232-1
reference_type
scores
url https://usn.ubuntu.com/4232-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-14?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-14?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-14%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-15277
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6hay-bjuv-nygd
31
url VCID-6te1-rqru-k3be
vulnerability_id VCID-6te1-rqru-k3be
summary security update
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=b3eca3eaa264
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=b3eca3eaa264
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14994
reference_id
reference_type
scores
0
value 0.02352
scoring_system epss
scoring_elements 0.84923
published_at 2026-04-16T12:55:00Z
1
value 0.02352
scoring_system epss
scoring_elements 0.84908
published_at 2026-04-11T12:55:00Z
2
value 0.02352
scoring_system epss
scoring_elements 0.84907
published_at 2026-04-12T12:55:00Z
3
value 0.02352
scoring_system epss
scoring_elements 0.84901
published_at 2026-04-13T12:55:00Z
4
value 0.02352
scoring_system epss
scoring_elements 0.84825
published_at 2026-04-01T12:55:00Z
5
value 0.02352
scoring_system epss
scoring_elements 0.84841
published_at 2026-04-02T12:55:00Z
6
value 0.02352
scoring_system epss
scoring_elements 0.84859
published_at 2026-04-04T12:55:00Z
7
value 0.02352
scoring_system epss
scoring_elements 0.8486
published_at 2026-04-07T12:55:00Z
8
value 0.02352
scoring_system epss
scoring_elements 0.84883
published_at 2026-04-08T12:55:00Z
9
value 0.02352
scoring_system epss
scoring_elements 0.8489
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14994
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
60
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
62
reference_url https://nandynarwhals.org/CVE-2017-14994/
reference_id
reference_type
scores
url https://nandynarwhals.org/CVE-2017-14994/
63
reference_url https://sourceforge.net/p/graphicsmagick/bugs/512/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/512/
64
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
65
reference_url http://www.securityfocus.com/bid/101182
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101182
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14994
reference_id CVE-2017-14994
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-14994
70
reference_url https://usn.ubuntu.com/4232-1/
reference_id USN-4232-1
reference_type
scores
url https://usn.ubuntu.com/4232-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-13?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-13?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-13%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-14994
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6te1-rqru-k3be
32
url VCID-725n-u2ss-ayda
vulnerability_id VCID-725n-u2ss-ayda
summary ReadJXLImage in JXL in GraphicsMagick before 1.3.46 lacks image dimension resource limits.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27795
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23459
published_at 2026-04-16T12:55:00Z
1
value 0.00327
scoring_system epss
scoring_elements 0.55624
published_at 2026-04-02T12:55:00Z
2
value 0.00327
scoring_system epss
scoring_elements 0.55652
published_at 2026-04-13T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55648
published_at 2026-04-04T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55678
published_at 2026-04-08T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55626
published_at 2026-04-07T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.5567
published_at 2026-04-12T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55689
published_at 2026-04-11T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.55681
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27795
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099955
reference_id 1099955
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099955
3
reference_url https://github.com/libjxl/libjxl/issues/3792#issuecomment-2330978387
reference_id 3792#issuecomment-2330978387
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T19:37:23Z/
url https://github.com/libjxl/libjxl/issues/3792#issuecomment-2330978387
4
reference_url https://github.com/libjxl/libjxl/issues/3793#issuecomment-2334843280
reference_id 3793#issuecomment-2334843280
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T19:37:23Z/
url https://github.com/libjxl/libjxl/issues/3793#issuecomment-2334843280
5
reference_url https://issues.oss-fuzz.com/issues/42536330#comment6
reference_id 42536330#comment6
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T19:37:23Z/
url https://issues.oss-fuzz.com/issues/42536330#comment6
6
reference_url https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/9bbae7314e3c3b19b830591010ed90bb136b9c42
reference_id 9bbae7314e3c3b19b830591010ed90bb136b9c42
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T19:37:23Z/
url https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/9bbae7314e3c3b19b830591010ed90bb136b9c42
7
reference_url http://www.graphicsmagick.org/NEWS.html
reference_id NEWS.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T19:37:23Z/
url http://www.graphicsmagick.org/NEWS.html
8
reference_url https://usn.ubuntu.com/7433-1/
reference_id USN-7433-1
reference_type
scores
url https://usn.ubuntu.com/7433-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@0?distro=trixie
purl pkg:deb/debian/graphicsmagick@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@0%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17689-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17689-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17689-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
5
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2025-27795
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-725n-u2ss-ayda
33
url VCID-756j-6ajn-zkcp
vulnerability_id VCID-756j-6ajn-zkcp
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19953
reference_id
reference_type
scores
0
value 0.01306
scoring_system epss
scoring_elements 0.79718
published_at 2026-04-01T12:55:00Z
1
value 0.01306
scoring_system epss
scoring_elements 0.79725
published_at 2026-04-02T12:55:00Z
2
value 0.01306
scoring_system epss
scoring_elements 0.79747
published_at 2026-04-04T12:55:00Z
3
value 0.01306
scoring_system epss
scoring_elements 0.79733
published_at 2026-04-07T12:55:00Z
4
value 0.01306
scoring_system epss
scoring_elements 0.79762
published_at 2026-04-08T12:55:00Z
5
value 0.01306
scoring_system epss
scoring_elements 0.79768
published_at 2026-04-09T12:55:00Z
6
value 0.01306
scoring_system epss
scoring_elements 0.7979
published_at 2026-04-11T12:55:00Z
7
value 0.01306
scoring_system epss
scoring_elements 0.79774
published_at 2026-04-12T12:55:00Z
8
value 0.01306
scoring_system epss
scoring_elements 0.79767
published_at 2026-04-13T12:55:00Z
9
value 0.01306
scoring_system epss
scoring_elements 0.79794
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19953
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19950
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947311
reference_id 947311
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947311
5
reference_url https://usn.ubuntu.com/USN-5190-1/
reference_id USN-USN-5190-1
reference_type
scores
url https://usn.ubuntu.com/USN-5190-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.34-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.34-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.34-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-19953
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-756j-6ajn-zkcp
34
url VCID-7868-hbyh-tkgf
vulnerability_id VCID-7868-hbyh-tkgf
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11636
reference_id
reference_type
scores
0
value 0.0074
scoring_system epss
scoring_elements 0.72953
published_at 2026-04-16T12:55:00Z
1
value 0.0074
scoring_system epss
scoring_elements 0.72912
published_at 2026-04-13T12:55:00Z
2
value 0.0074
scoring_system epss
scoring_elements 0.72856
published_at 2026-04-01T12:55:00Z
3
value 0.0074
scoring_system epss
scoring_elements 0.72863
published_at 2026-04-02T12:55:00Z
4
value 0.0074
scoring_system epss
scoring_elements 0.72883
published_at 2026-04-04T12:55:00Z
5
value 0.0074
scoring_system epss
scoring_elements 0.72858
published_at 2026-04-07T12:55:00Z
6
value 0.0074
scoring_system epss
scoring_elements 0.72896
published_at 2026-04-08T12:55:00Z
7
value 0.0074
scoring_system epss
scoring_elements 0.7291
published_at 2026-04-09T12:55:00Z
8
value 0.0074
scoring_system epss
scoring_elements 0.72935
published_at 2026-04-11T12:55:00Z
9
value 0.0074
scoring_system epss
scoring_elements 0.72918
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11636
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870149
reference_id 870149
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870149
59
reference_url https://usn.ubuntu.com/4206-1/
reference_id USN-4206-1
reference_type
scores
url https://usn.ubuntu.com/4206-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-4?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-4%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-11636
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7868-hbyh-tkgf
35
url VCID-7fjy-7tv8-wqca
vulnerability_id VCID-7fjy-7tv8-wqca
summary A memory allocation failure was discovered in the ReadPNMImage function in coders/pnm.c in GraphicsMagick 1.3.26. The vulnerability causes a big memory allocation, which may lead to remote denial of service in the MagickRealloc function in magick/memory.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14042
reference_id
reference_type
scores
0
value 0.00431
scoring_system epss
scoring_elements 0.62659
published_at 2026-04-16T12:55:00Z
1
value 0.00431
scoring_system epss
scoring_elements 0.62617
published_at 2026-04-13T12:55:00Z
2
value 0.00431
scoring_system epss
scoring_elements 0.62633
published_at 2026-04-09T12:55:00Z
3
value 0.00431
scoring_system epss
scoring_elements 0.62652
published_at 2026-04-11T12:55:00Z
4
value 0.00431
scoring_system epss
scoring_elements 0.6264
published_at 2026-04-12T12:55:00Z
5
value 0.00711
scoring_system epss
scoring_elements 0.72251
published_at 2026-04-08T12:55:00Z
6
value 0.00711
scoring_system epss
scoring_elements 0.72219
published_at 2026-04-02T12:55:00Z
7
value 0.00711
scoring_system epss
scoring_elements 0.72238
published_at 2026-04-04T12:55:00Z
8
value 0.00711
scoring_system epss
scoring_elements 0.72214
published_at 2026-04-07T12:55:00Z
9
value 0.00711
scoring_system epss
scoring_elements 0.72213
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14042
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14042
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873538
reference_id 873538
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873538
4
reference_url https://usn.ubuntu.com/4206-1/
reference_id USN-4206-1
reference_type
scores
url https://usn.ubuntu.com/4206-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-9?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-9%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-14042
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7fjy-7tv8-wqca
36
url VCID-7fmu-6e6q-r7hd
vulnerability_id VCID-7fmu-6e6q-r7hd
summary security update
references
0
reference_url http://git.imagemagick.org/repos/ImageMagick/commit/40639d173aa8c76b850d625c630b711fee4dcfb8
reference_id
reference_type
scores
url http://git.imagemagick.org/repos/ImageMagick/commit/40639d173aa8c76b850d625c630b711fee4dcfb8
1
reference_url http://hg.code.sf.net/p/graphicsmagick/code/file/41876934e762/ChangeLog
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/file/41876934e762/ChangeLog
2
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/ae3928faa858
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/ae3928faa858
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00008.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00009.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00011.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00021.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00030.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00047.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5118.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5118.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5118
reference_id
reference_type
scores
0
value 0.31781
scoring_system epss
scoring_elements 0.96805
published_at 2026-04-16T12:55:00Z
1
value 0.31781
scoring_system epss
scoring_elements 0.96799
published_at 2026-04-12T12:55:00Z
2
value 0.31781
scoring_system epss
scoring_elements 0.968
published_at 2026-04-13T12:55:00Z
3
value 0.31781
scoring_system epss
scoring_elements 0.96772
published_at 2026-04-01T12:55:00Z
4
value 0.31781
scoring_system epss
scoring_elements 0.96781
published_at 2026-04-02T12:55:00Z
5
value 0.31781
scoring_system epss
scoring_elements 0.96783
published_at 2026-04-04T12:55:00Z
6
value 0.31781
scoring_system epss
scoring_elements 0.96787
published_at 2026-04-07T12:55:00Z
7
value 0.31781
scoring_system epss
scoring_elements 0.96795
published_at 2026-04-08T12:55:00Z
8
value 0.31781
scoring_system epss
scoring_elements 0.96796
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5118
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.debian.org/security/2016/dsa-3591
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3591
28
reference_url http://www.debian.org/security/2016/dsa-3746
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3746
29
reference_url http://www.openwall.com/lists/oss-security/2016/05/29/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/29/7
30
reference_url http://www.openwall.com/lists/oss-security/2016/05/30/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/30/1
31
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
32
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
33
reference_url http://www.securityfocus.com/bid/90938
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90938
34
reference_url http://www.securitytracker.com/id/1035984
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035984
35
reference_url http://www.securitytracker.com/id/1035985
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035985
36
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.397749
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.397749
37
reference_url http://www.ubuntu.com/usn/USN-2990-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2990-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1340814
reference_id 1340814
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1340814
39
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825799
reference_id 825799
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825799
40
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825800
reference_id 825800
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825800
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5118
reference_id CVE-2016-5118
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5118
66
reference_url https://access.redhat.com/errata/RHSA-2016:1237
reference_id RHSA-2016:1237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1237
67
reference_url https://usn.ubuntu.com/2990-1/
reference_id USN-2990-1
reference_type
scores
url https://usn.ubuntu.com/2990-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.24-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-5118
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7fmu-6e6q-r7hd
37
url VCID-7hxc-bmqq-pyf3
vulnerability_id VCID-7hxc-bmqq-pyf3
summary security flaw
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
1
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=345238
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=345238
2
reference_url http://rhn.redhat.com/errata/RHSA-2006-0178.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0178.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4601.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4601.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-4601
reference_id
reference_type
scores
0
value 0.11889
scoring_system epss
scoring_elements 0.9376
published_at 2026-04-16T12:55:00Z
1
value 0.11889
scoring_system epss
scoring_elements 0.937
published_at 2026-04-01T12:55:00Z
2
value 0.11889
scoring_system epss
scoring_elements 0.93709
published_at 2026-04-02T12:55:00Z
3
value 0.11889
scoring_system epss
scoring_elements 0.9372
published_at 2026-04-04T12:55:00Z
4
value 0.11889
scoring_system epss
scoring_elements 0.93723
published_at 2026-04-07T12:55:00Z
5
value 0.11889
scoring_system epss
scoring_elements 0.93731
published_at 2026-04-08T12:55:00Z
6
value 0.11889
scoring_system epss
scoring_elements 0.93733
published_at 2026-04-09T12:55:00Z
7
value 0.11889
scoring_system epss
scoring_elements 0.93738
published_at 2026-04-13T12:55:00Z
8
value 0.11889
scoring_system epss
scoring_elements 0.93737
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-4601
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4601
6
reference_url http://secunia.com/advisories/18261
reference_id
reference_type
scores
url http://secunia.com/advisories/18261
7
reference_url http://secunia.com/advisories/18607
reference_id
reference_type
scores
url http://secunia.com/advisories/18607
8
reference_url http://secunia.com/advisories/18631
reference_id
reference_type
scores
url http://secunia.com/advisories/18631
9
reference_url http://secunia.com/advisories/18871
reference_id
reference_type
scores
url http://secunia.com/advisories/18871
10
reference_url http://secunia.com/advisories/19183
reference_id
reference_type
scores
url http://secunia.com/advisories/19183
11
reference_url http://secunia.com/advisories/19408
reference_id
reference_type
scores
url http://secunia.com/advisories/19408
12
reference_url http://secunia.com/advisories/23090
reference_id
reference_type
scores
url http://secunia.com/advisories/23090
13
reference_url http://secunia.com/advisories/28800
reference_id
reference_type
scores
url http://secunia.com/advisories/28800
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/23927
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/23927
15
reference_url https://issues.rpath.com/browse/RPL-389
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-389
16
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.341682
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.341682
17
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10353
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10353
18
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1
19
reference_url http://www.debian.org/security/2006/dsa-957
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-957
20
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:024
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:024
21
reference_url http://www.novell.com/linux/security/advisories/2006_06_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006_06_sr.html
22
reference_url http://www.osvdb.org/22121
reference_id
reference_type
scores
url http://www.osvdb.org/22121
23
reference_url http://www.securityfocus.com/archive/1/452718/100/100/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/452718/100/100/threaded
24
reference_url http://www.securityfocus.com/bid/16093
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/16093
25
reference_url http://www.ubuntu.com/usn/usn-246-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-246-1
26
reference_url http://www.vupen.com/english/advisories/2008/0412
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0412
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617859
reference_id 1617859
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617859
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=345238
reference_id 345238
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=345238
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.2.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.4.5:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-4601
reference_id CVE-2005-4601
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-4601
31
reference_url https://access.redhat.com/errata/RHSA-2006:0178
reference_id RHSA-2006:0178
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0178
32
reference_url https://usn.ubuntu.com/246-1/
reference_id USN-246-1
reference_type
scores
url https://usn.ubuntu.com/246-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.7-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.7-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2005-4601
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7hxc-bmqq-pyf3
38
url VCID-7wrg-6pw1-nucx
vulnerability_id VCID-7wrg-6pw1-nucx
summary security update
references
0
reference_url http://git.imagemagick.org/repos/ImageMagick/commit/70a2cf326ed32bedee144b961005c63846541a16
reference_id
reference_type
scores
url http://git.imagemagick.org/repos/ImageMagick/commit/70a2cf326ed32bedee144b961005c63846541a16
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5239.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5239.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5239
reference_id
reference_type
scores
0
value 0.00922
scoring_system epss
scoring_elements 0.76012
published_at 2026-04-16T12:55:00Z
1
value 0.00922
scoring_system epss
scoring_elements 0.7598
published_at 2026-04-12T12:55:00Z
2
value 0.00922
scoring_system epss
scoring_elements 0.75973
published_at 2026-04-13T12:55:00Z
3
value 0.00922
scoring_system epss
scoring_elements 0.75918
published_at 2026-04-01T12:55:00Z
4
value 0.00922
scoring_system epss
scoring_elements 0.75921
published_at 2026-04-02T12:55:00Z
5
value 0.00922
scoring_system epss
scoring_elements 0.75953
published_at 2026-04-04T12:55:00Z
6
value 0.00922
scoring_system epss
scoring_elements 0.75932
published_at 2026-04-07T12:55:00Z
7
value 0.00922
scoring_system epss
scoring_elements 0.75965
published_at 2026-04-08T12:55:00Z
8
value 0.00922
scoring_system epss
scoring_elements 0.75978
published_at 2026-04-09T12:55:00Z
9
value 0.00922
scoring_system epss
scoring_elements 0.76003
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5239
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
11
reference_url http://www.openwall.com/lists/oss-security/2016/06/02/13
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/06/02/13
12
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
13
reference_url http://www.securityfocus.com/bid/91018
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91018
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1334188
reference_id 1334188
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1334188
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5239
reference_id CVE-2016-5239
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5239
17
reference_url https://access.redhat.com/errata/RHSA-2016:1237
reference_id RHSA-2016:1237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1237
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.24-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-5239
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wrg-6pw1-nucx
39
url VCID-8b34-juwg-pkcb
vulnerability_id VCID-8b34-juwg-pkcb
summary
GraphicsMagick improperly handles PALM and DCM images, potentially
    resulting in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5456.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-5456
reference_id
reference_type
scores
0
value 0.00851
scoring_system epss
scoring_elements 0.74847
published_at 2026-04-01T12:55:00Z
1
value 0.00851
scoring_system epss
scoring_elements 0.74848
published_at 2026-04-02T12:55:00Z
2
value 0.00851
scoring_system epss
scoring_elements 0.74877
published_at 2026-04-04T12:55:00Z
3
value 0.00851
scoring_system epss
scoring_elements 0.7485
published_at 2026-04-07T12:55:00Z
4
value 0.00851
scoring_system epss
scoring_elements 0.74883
published_at 2026-04-08T12:55:00Z
5
value 0.00851
scoring_system epss
scoring_elements 0.74896
published_at 2026-04-09T12:55:00Z
6
value 0.00851
scoring_system epss
scoring_elements 0.7492
published_at 2026-04-11T12:55:00Z
7
value 0.00851
scoring_system epss
scoring_elements 0.74898
published_at 2026-04-12T12:55:00Z
8
value 0.00851
scoring_system epss
scoring_elements 0.74888
published_at 2026-04-13T12:55:00Z
9
value 0.00851
scoring_system epss
scoring_elements 0.74925
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-5456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=210921
reference_id 210921
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=210921
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=393025
reference_id 393025
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=393025
5
reference_url https://security.gentoo.org/glsa/200611-07
reference_id GLSA-200611-07
reference_type
scores
url https://security.gentoo.org/glsa/200611-07
6
reference_url https://security.gentoo.org/glsa/200611-19
reference_id GLSA-200611-19
reference_type
scores
url https://security.gentoo.org/glsa/200611-19
7
reference_url https://access.redhat.com/errata/RHSA-2007:0015
reference_id RHSA-2007:0015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0015
8
reference_url https://usn.ubuntu.com/372-1/
reference_id USN-372-1
reference_type
scores
url https://usn.ubuntu.com/372-1/
9
reference_url https://usn.ubuntu.com/422-1/
reference_id USN-422-1
reference_type
scores
url https://usn.ubuntu.com/422-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.7-9?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.7-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.7-9%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2006-5456
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8b34-juwg-pkcb
40
url VCID-8fa4-9jsh-3bh9
vulnerability_id VCID-8fa4-9jsh-3bh9
summary
Multiple vulnerabilities have been found in ImageMagick, the worst
    of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
reference_id
reference_type
scores
url http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0726.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0726.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3717.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3717.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3717
reference_id
reference_type
scores
0
value 0.33655
scoring_system epss
scoring_elements 0.96948
published_at 2026-04-16T12:55:00Z
1
value 0.33655
scoring_system epss
scoring_elements 0.96941
published_at 2026-04-13T12:55:00Z
2
value 0.33655
scoring_system epss
scoring_elements 0.9691
published_at 2026-04-01T12:55:00Z
3
value 0.33655
scoring_system epss
scoring_elements 0.96918
published_at 2026-04-02T12:55:00Z
4
value 0.33655
scoring_system epss
scoring_elements 0.96923
published_at 2026-04-04T12:55:00Z
5
value 0.33655
scoring_system epss
scoring_elements 0.96927
published_at 2026-04-07T12:55:00Z
6
value 0.33655
scoring_system epss
scoring_elements 0.96935
published_at 2026-04-08T12:55:00Z
7
value 0.33655
scoring_system epss
scoring_elements 0.96937
published_at 2026-04-09T12:55:00Z
8
value 0.33655
scoring_system epss
scoring_elements 0.96939
published_at 2026-04-11T12:55:00Z
9
value 0.33655
scoring_system epss
scoring_elements 0.9694
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3717
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239
15
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
16
reference_url https://www.exploit-db.com/exploits/39767/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/39767/
17
reference_url https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
reference_id
reference_type
scores
url https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
18
reference_url https://www.imagemagick.org/script/changelog.php
reference_id
reference_type
scores
url https://www.imagemagick.org/script/changelog.php
19
reference_url http://www.debian.org/security/2016/dsa-3580
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3580
20
reference_url http://www.openwall.com/lists/oss-security/2016/05/03/18
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/03/18
21
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
22
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
23
reference_url http://www.securityfocus.com/archive/1/538378/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/538378/100/0/threaded
24
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
25
reference_url http://www.ubuntu.com/usn/USN-2990-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2990-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1332505
reference_id 1332505
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1332505
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3717
reference_id CVE-2016-3717
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:N/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-3717
47
reference_url https://security.gentoo.org/glsa/201611-21
reference_id GLSA-201611-21
reference_type
scores
url https://security.gentoo.org/glsa/201611-21
48
reference_url https://access.redhat.com/errata/RHSA-2016:0726
reference_id RHSA-2016:0726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0726
49
reference_url https://usn.ubuntu.com/2990-1/
reference_id USN-2990-1
reference_type
scores
url https://usn.ubuntu.com/2990-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.24-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-3717
risk_score 10.0
exploitability 2.0
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fa4-9jsh-3bh9
41
url VCID-8v9a-4t7e-9qax
vulnerability_id VCID-8v9a-4t7e-9qax
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13065
reference_id
reference_type
scores
0
value 0.01287
scoring_system epss
scoring_elements 0.79666
published_at 2026-04-16T12:55:00Z
1
value 0.01287
scoring_system epss
scoring_elements 0.79642
published_at 2026-04-12T12:55:00Z
2
value 0.01287
scoring_system epss
scoring_elements 0.79635
published_at 2026-04-13T12:55:00Z
3
value 0.01287
scoring_system epss
scoring_elements 0.79585
published_at 2026-04-01T12:55:00Z
4
value 0.01287
scoring_system epss
scoring_elements 0.79592
published_at 2026-04-02T12:55:00Z
5
value 0.01287
scoring_system epss
scoring_elements 0.79614
published_at 2026-04-04T12:55:00Z
6
value 0.01287
scoring_system epss
scoring_elements 0.79601
published_at 2026-04-07T12:55:00Z
7
value 0.01287
scoring_system epss
scoring_elements 0.7963
published_at 2026-04-08T12:55:00Z
8
value 0.01287
scoring_system epss
scoring_elements 0.79637
published_at 2026-04-09T12:55:00Z
9
value 0.01287
scoring_system epss
scoring_elements 0.79658
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13065
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873119
reference_id 873119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873119
59
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
60
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
61
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-7?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-7%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-13065
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8v9a-4t7e-9qax
42
url VCID-8w85-15cj-rubq
vulnerability_id VCID-8w85-15cj-rubq
summary , CVE-2008-6071, CVE-2008-6072, CVE-2008-6621 multiple security issues in ImageMagick
references
0
reference_url http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/palm.c
reference_id
reference_type
scores
url http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/palm.c
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-6070.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-6070.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-6070
reference_id
reference_type
scores
0
value 0.03358
scoring_system epss
scoring_elements 0.87352
published_at 2026-04-16T12:55:00Z
1
value 0.03358
scoring_system epss
scoring_elements 0.87284
published_at 2026-04-01T12:55:00Z
2
value 0.03358
scoring_system epss
scoring_elements 0.87294
published_at 2026-04-02T12:55:00Z
3
value 0.03358
scoring_system epss
scoring_elements 0.8731
published_at 2026-04-04T12:55:00Z
4
value 0.03358
scoring_system epss
scoring_elements 0.87308
published_at 2026-04-07T12:55:00Z
5
value 0.03358
scoring_system epss
scoring_elements 0.87327
published_at 2026-04-08T12:55:00Z
6
value 0.03358
scoring_system epss
scoring_elements 0.87334
published_at 2026-04-09T12:55:00Z
7
value 0.03358
scoring_system epss
scoring_elements 0.87347
published_at 2026-04-11T12:55:00Z
8
value 0.03358
scoring_system epss
scoring_elements 0.87341
published_at 2026-04-12T12:55:00Z
9
value 0.03358
scoring_system epss
scoring_elements 0.87337
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-6070
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6070
4
reference_url http://secunia.com/advisories/30549
reference_id
reference_type
scores
url http://secunia.com/advisories/30549
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/42904
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/42904
6
reference_url http://sourceforge.net/project/shownotes.php?release_id=604837
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=604837
7
reference_url http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485
8
reference_url http://www.securityfocus.com/bid/29583
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29583
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=516295
reference_id 516295
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=516295
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.5:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.13:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.14:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-6070
reference_id CVE-2008-6070
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-6070
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.2.3-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.2.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.2.3-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2008-6070
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8w85-15cj-rubq
43
url VCID-8x5y-ggze-bqbt
vulnerability_id VCID-8x5y-ggze-bqbt
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-9018.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-9018.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-9018
reference_id
reference_type
scores
0
value 0.01892
scoring_system epss
scoring_elements 0.83122
published_at 2026-04-01T12:55:00Z
1
value 0.01892
scoring_system epss
scoring_elements 0.83139
published_at 2026-04-02T12:55:00Z
2
value 0.01892
scoring_system epss
scoring_elements 0.83153
published_at 2026-04-04T12:55:00Z
3
value 0.01892
scoring_system epss
scoring_elements 0.83152
published_at 2026-04-07T12:55:00Z
4
value 0.01892
scoring_system epss
scoring_elements 0.83177
published_at 2026-04-08T12:55:00Z
5
value 0.01892
scoring_system epss
scoring_elements 0.83183
published_at 2026-04-09T12:55:00Z
6
value 0.01892
scoring_system epss
scoring_elements 0.83199
published_at 2026-04-11T12:55:00Z
7
value 0.01892
scoring_system epss
scoring_elements 0.83193
published_at 2026-04-12T12:55:00Z
8
value 0.01892
scoring_system epss
scoring_elements 0.83189
published_at 2026-04-13T12:55:00Z
9
value 0.01892
scoring_system epss
scoring_elements 0.83226
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-9018
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1561225
reference_id 1561225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1561225
60
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894396
reference_id 894396
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894396
61
reference_url https://usn.ubuntu.com/5974-1/
reference_id USN-5974-1
reference_type
scores
url https://usn.ubuntu.com/5974-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.28-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.28-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.28-2%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2018-9018
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8x5y-ggze-bqbt
44
url VCID-9c6a-x7jz-kkf7
vulnerability_id VCID-9c6a-x7jz-kkf7
summary ReadOneJNGImage in coders/png.c in GraphicsMagick version 1.3.26 does not properly validate JNG data, leading to a denial of service (assertion failure in magick/pixel_cache.c, and application crash).
references
0
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/358608a46f0a
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/358608a46f0a
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14649
reference_id
reference_type
scores
0
value 0.00466
scoring_system epss
scoring_elements 0.64424
published_at 2026-04-16T12:55:00Z
1
value 0.00466
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-12T12:55:00Z
2
value 0.00466
scoring_system epss
scoring_elements 0.6443
published_at 2026-04-11T12:55:00Z
3
value 0.00466
scoring_system epss
scoring_elements 0.64388
published_at 2026-04-13T12:55:00Z
4
value 0.00466
scoring_system epss
scoring_elements 0.6431
published_at 2026-04-01T12:55:00Z
5
value 0.00466
scoring_system epss
scoring_elements 0.64365
published_at 2026-04-02T12:55:00Z
6
value 0.00466
scoring_system epss
scoring_elements 0.64394
published_at 2026-04-04T12:55:00Z
7
value 0.00466
scoring_system epss
scoring_elements 0.64354
published_at 2026-04-07T12:55:00Z
8
value 0.00466
scoring_system epss
scoring_elements 0.64402
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14649
2
reference_url https://blogs.gentoo.org/ago/2017/09/19/graphicsmagick-assertion-failure-in-pixel_cache-c/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/09/19/graphicsmagick-assertion-failure-in-pixel_cache-c/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14649
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
7
reference_url https://sourceforge.net/p/graphicsmagick/bugs/439/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/439/
8
reference_url http://www.securityfocus.com/bid/100958
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100958
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876460
reference_id 876460
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876460
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14649
reference_id CVE-2017-14649
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-14649
12
reference_url https://usn.ubuntu.com/4232-1/
reference_id USN-4232-1
reference_type
scores
url https://usn.ubuntu.com/4232-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-12?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-12?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-12%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-14649
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9c6a-x7jz-kkf7
45
url VCID-9en7-dh85-afac
vulnerability_id VCID-9en7-dh85-afac
summary security update
references
0
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/2835184bfb78
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/2835184bfb78
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14314
reference_id
reference_type
scores
0
value 0.00758
scoring_system epss
scoring_elements 0.73338
published_at 2026-04-16T12:55:00Z
1
value 0.00758
scoring_system epss
scoring_elements 0.73295
published_at 2026-04-13T12:55:00Z
2
value 0.00758
scoring_system epss
scoring_elements 0.73243
published_at 2026-04-01T12:55:00Z
3
value 0.00758
scoring_system epss
scoring_elements 0.73254
published_at 2026-04-02T12:55:00Z
4
value 0.00758
scoring_system epss
scoring_elements 0.73276
published_at 2026-04-04T12:55:00Z
5
value 0.00758
scoring_system epss
scoring_elements 0.73249
published_at 2026-04-07T12:55:00Z
6
value 0.00758
scoring_system epss
scoring_elements 0.73285
published_at 2026-04-08T12:55:00Z
7
value 0.00758
scoring_system epss
scoring_elements 0.73298
published_at 2026-04-09T12:55:00Z
8
value 0.00758
scoring_system epss
scoring_elements 0.73323
published_at 2026-04-11T12:55:00Z
9
value 0.00758
scoring_system epss
scoring_elements 0.73303
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14314
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
59
reference_url https://sourceforge.net/p/graphicsmagick/bugs/448/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/448/
60
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14314
reference_id CVE-2017-14314
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-14314
65
reference_url https://usn.ubuntu.com/4232-1/
reference_id USN-4232-1
reference_type
scores
url https://usn.ubuntu.com/4232-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-10?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-10%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-14314
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9en7-dh85-afac
46
url VCID-9mfa-959d-qqb7
vulnerability_id VCID-9mfa-959d-qqb7
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11642
reference_id
reference_type
scores
0
value 0.00269
scoring_system epss
scoring_elements 0.50478
published_at 2026-04-16T12:55:00Z
1
value 0.00269
scoring_system epss
scoring_elements 0.50435
published_at 2026-04-13T12:55:00Z
2
value 0.00269
scoring_system epss
scoring_elements 0.50347
published_at 2026-04-01T12:55:00Z
3
value 0.00269
scoring_system epss
scoring_elements 0.50403
published_at 2026-04-02T12:55:00Z
4
value 0.00269
scoring_system epss
scoring_elements 0.50432
published_at 2026-04-09T12:55:00Z
5
value 0.00269
scoring_system epss
scoring_elements 0.50385
published_at 2026-04-07T12:55:00Z
6
value 0.00269
scoring_system epss
scoring_elements 0.50438
published_at 2026-04-08T12:55:00Z
7
value 0.00269
scoring_system epss
scoring_elements 0.50473
published_at 2026-04-11T12:55:00Z
8
value 0.00269
scoring_system epss
scoring_elements 0.5045
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11642
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870156
reference_id 870156
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870156
59
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-4?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-4%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-11642
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9mfa-959d-qqb7
47
url VCID-9ty9-95mx-mfak
vulnerability_id VCID-9ty9-95mx-mfak
summary GraphicsMagick before 8e56520 has a heap-based buffer over-read in ReadJXLImage in coders/jxl.c, related to an ImportViewPixelArea call.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32460
reference_id
reference_type
scores
0
value 0.0029
scoring_system epss
scoring_elements 0.52439
published_at 2026-04-16T12:55:00Z
1
value 0.0029
scoring_system epss
scoring_elements 0.52338
published_at 2026-04-02T12:55:00Z
2
value 0.0029
scoring_system epss
scoring_elements 0.52366
published_at 2026-04-04T12:55:00Z
3
value 0.0029
scoring_system epss
scoring_elements 0.52331
published_at 2026-04-07T12:55:00Z
4
value 0.0029
scoring_system epss
scoring_elements 0.52384
published_at 2026-04-08T12:55:00Z
5
value 0.0029
scoring_system epss
scoring_elements 0.5238
published_at 2026-04-09T12:55:00Z
6
value 0.0029
scoring_system epss
scoring_elements 0.52429
published_at 2026-04-11T12:55:00Z
7
value 0.0029
scoring_system epss
scoring_elements 0.52414
published_at 2026-04-12T12:55:00Z
8
value 0.0029
scoring_system epss
scoring_elements 0.524
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32460
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://issues.oss-fuzz.com/issues/406320404
reference_id 406320404
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T19:26:13Z/
url https://issues.oss-fuzz.com/issues/406320404
3
reference_url https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/8e56520435df50f618a03f2721a39a70a515f1cb
reference_id 8e56520435df50f618a03f2721a39a70a515f1cb
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T19:26:13Z/
url https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/8e56520435df50f618a03f2721a39a70a515f1cb
4
reference_url https://tracker.debian.org/news/1636753/accepted-graphicsmagick-14really1345hg17696-1-source-into-unstable/
reference_id accepted-graphicsmagick-14really1345hg17696-1-source-into-unstable
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T19:26:13Z/
url https://tracker.debian.org/news/1636753/accepted-graphicsmagick-14really1345hg17696-1-source-into-unstable/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@0?distro=trixie
purl pkg:deb/debian/graphicsmagick@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@0%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2025-32460
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ty9-95mx-mfak
48
url VCID-aafx-3f53-8bbd
vulnerability_id VCID-aafx-3f53-8bbd
summary security update
references
0
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/460ef5e858ad
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/460ef5e858ad
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17503
reference_id
reference_type
scores
0
value 0.00945
scoring_system epss
scoring_elements 0.76349
published_at 2026-04-16T12:55:00Z
1
value 0.00945
scoring_system epss
scoring_elements 0.76335
published_at 2026-04-11T12:55:00Z
2
value 0.00945
scoring_system epss
scoring_elements 0.76313
published_at 2026-04-12T12:55:00Z
3
value 0.00945
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-13T12:55:00Z
4
value 0.00945
scoring_system epss
scoring_elements 0.76248
published_at 2026-04-01T12:55:00Z
5
value 0.00945
scoring_system epss
scoring_elements 0.76252
published_at 2026-04-02T12:55:00Z
6
value 0.00945
scoring_system epss
scoring_elements 0.76282
published_at 2026-04-04T12:55:00Z
7
value 0.00945
scoring_system epss
scoring_elements 0.76262
published_at 2026-04-07T12:55:00Z
8
value 0.00945
scoring_system epss
scoring_elements 0.76294
published_at 2026-04-08T12:55:00Z
9
value 0.00945
scoring_system epss
scoring_elements 0.76308
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
60
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
62
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
63
reference_url https://sourceforge.net/p/graphicsmagick/bugs/522/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/522/
64
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17503
reference_id CVE-2017-17503
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17503
70
reference_url https://usn.ubuntu.com/4248-1/
reference_id USN-4248-1
reference_type
scores
url https://usn.ubuntu.com/4248-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-17503
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aafx-3f53-8bbd
49
url VCID-ak8s-9hyp-47fa
vulnerability_id VCID-ak8s-9hyp-47fa
summary
A format string vulnerability exists in ImageMagick that may allow an
    attacker to execute arbitrary code.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=83542
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=83542
1
reference_url http://marc.info/?l=bugtraq&m=110987256010857&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110987256010857&w=2
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0397.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0397.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0397
reference_id
reference_type
scores
0
value 0.04522
scoring_system epss
scoring_elements 0.89173
published_at 2026-04-16T12:55:00Z
1
value 0.04522
scoring_system epss
scoring_elements 0.89108
published_at 2026-04-01T12:55:00Z
2
value 0.04522
scoring_system epss
scoring_elements 0.89116
published_at 2026-04-02T12:55:00Z
3
value 0.04522
scoring_system epss
scoring_elements 0.89131
published_at 2026-04-04T12:55:00Z
4
value 0.04522
scoring_system epss
scoring_elements 0.89134
published_at 2026-04-07T12:55:00Z
5
value 0.04522
scoring_system epss
scoring_elements 0.89151
published_at 2026-04-08T12:55:00Z
6
value 0.04522
scoring_system epss
scoring_elements 0.89157
published_at 2026-04-09T12:55:00Z
7
value 0.04522
scoring_system epss
scoring_elements 0.89167
published_at 2026-04-11T12:55:00Z
8
value 0.04522
scoring_system epss
scoring_elements 0.89163
published_at 2026-04-12T12:55:00Z
9
value 0.04522
scoring_system epss
scoring_elements 0.8916
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0397
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0397
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/19586
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/19586
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10302
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10302
7
reference_url http://www.debian.org/security/2005/dsa-702
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-702
8
reference_url http://www.gentoo.org/security/en/glsa/glsa-200503-11.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200503-11.xml
9
reference_url http://www.novell.com/linux/security/advisories/2005_17_imagemagick.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_17_imagemagick.html
10
reference_url http://www.redhat.com/support/errata/RHSA-2005-070.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-070.html
11
reference_url http://www.redhat.com/support/errata/RHSA-2005-320.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-320.html
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617515
reference_id 1617515
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617515
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=297990
reference_id 297990
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=297990
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0397
reference_id CVE-2005-0397
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0397
19
reference_url https://security.gentoo.org/glsa/200503-11
reference_id GLSA-200503-11
reference_type
scores
url https://security.gentoo.org/glsa/200503-11
20
reference_url https://access.redhat.com/errata/RHSA-2005:070
reference_id RHSA-2005:070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:070
21
reference_url https://access.redhat.com/errata/RHSA-2005:320
reference_id RHSA-2005:320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:320
22
reference_url https://usn.ubuntu.com/90-1/
reference_id USN-90-1
reference_type
scores
url https://usn.ubuntu.com/90-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.7-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.7-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2005-0397
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ak8s-9hyp-47fa
50
url VCID-am38-b487-k7bn
vulnerability_id VCID-am38-b487-k7bn
summary In GraphicsMagick 1.3.31, the ReadDIBImage function of coders/dib.c has a vulnerability allowing a crash and denial of service via a dib file that is crafted to appear with direct pixel values and also colormapping (which is not available beyond 8-bits/sample), and therefore lacks indexes initialization.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20189
reference_id
reference_type
scores
0
value 0.01686
scoring_system epss
scoring_elements 0.82137
published_at 2026-04-01T12:55:00Z
1
value 0.01686
scoring_system epss
scoring_elements 0.8215
published_at 2026-04-02T12:55:00Z
2
value 0.01686
scoring_system epss
scoring_elements 0.82172
published_at 2026-04-04T12:55:00Z
3
value 0.01686
scoring_system epss
scoring_elements 0.82169
published_at 2026-04-07T12:55:00Z
4
value 0.01686
scoring_system epss
scoring_elements 0.82195
published_at 2026-04-08T12:55:00Z
5
value 0.01686
scoring_system epss
scoring_elements 0.82202
published_at 2026-04-09T12:55:00Z
6
value 0.01686
scoring_system epss
scoring_elements 0.82222
published_at 2026-04-11T12:55:00Z
7
value 0.01686
scoring_system epss
scoring_elements 0.82214
published_at 2026-04-12T12:55:00Z
8
value 0.01686
scoring_system epss
scoring_elements 0.82208
published_at 2026-04-13T12:55:00Z
9
value 0.01686
scoring_system epss
scoring_elements 0.82245
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20189
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20189
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916752
reference_id 916752
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916752
3
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
4
reference_url https://usn.ubuntu.com/5974-1/
reference_id USN-5974-1
reference_type
scores
url https://usn.ubuntu.com/5974-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg15873-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg15873-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg15873-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2018-20189
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-am38-b487-k7bn
51
url VCID-avrn-5876-z3ar
vulnerability_id VCID-avrn-5876-z3ar
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8684
reference_id
reference_type
scores
0
value 0.01059
scoring_system epss
scoring_elements 0.77672
published_at 2026-04-16T12:55:00Z
1
value 0.01059
scoring_system epss
scoring_elements 0.77576
published_at 2026-04-01T12:55:00Z
2
value 0.01059
scoring_system epss
scoring_elements 0.77583
published_at 2026-04-02T12:55:00Z
3
value 0.01059
scoring_system epss
scoring_elements 0.77609
published_at 2026-04-04T12:55:00Z
4
value 0.01059
scoring_system epss
scoring_elements 0.77591
published_at 2026-04-07T12:55:00Z
5
value 0.01059
scoring_system epss
scoring_elements 0.77619
published_at 2026-04-08T12:55:00Z
6
value 0.01059
scoring_system epss
scoring_elements 0.77626
published_at 2026-04-09T12:55:00Z
7
value 0.01059
scoring_system epss
scoring_elements 0.77653
published_at 2026-04-11T12:55:00Z
8
value 0.01059
scoring_system epss
scoring_elements 0.77636
published_at 2026-04-12T12:55:00Z
9
value 0.01059
scoring_system epss
scoring_elements 0.77635
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8684
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.25-5?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.25-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-5%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-8684
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-avrn-5876-z3ar
52
url VCID-b8sr-p8he-5khf
vulnerability_id VCID-b8sr-p8he-5khf
summary , CVE-2008-6071, CVE-2008-6072, CVE-2008-6621 multiple security issues in ImageMagick
references
0
reference_url http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/cineon.c
reference_id
reference_type
scores
url http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/cineon.c
1
reference_url http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/xcf.c
reference_id
reference_type
scores
url http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/xcf.c
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-6072.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-6072.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-6072
reference_id
reference_type
scores
0
value 0.01382
scoring_system epss
scoring_elements 0.80324
published_at 2026-04-16T12:55:00Z
1
value 0.01382
scoring_system epss
scoring_elements 0.80243
published_at 2026-04-01T12:55:00Z
2
value 0.01382
scoring_system epss
scoring_elements 0.8025
published_at 2026-04-02T12:55:00Z
3
value 0.01382
scoring_system epss
scoring_elements 0.8027
published_at 2026-04-04T12:55:00Z
4
value 0.01382
scoring_system epss
scoring_elements 0.80259
published_at 2026-04-07T12:55:00Z
5
value 0.01382
scoring_system epss
scoring_elements 0.80286
published_at 2026-04-08T12:55:00Z
6
value 0.01382
scoring_system epss
scoring_elements 0.80296
published_at 2026-04-09T12:55:00Z
7
value 0.01382
scoring_system epss
scoring_elements 0.80315
published_at 2026-04-11T12:55:00Z
8
value 0.01382
scoring_system epss
scoring_elements 0.803
published_at 2026-04-12T12:55:00Z
9
value 0.01382
scoring_system epss
scoring_elements 0.80294
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-6072
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6072
5
reference_url http://secunia.com/advisories/30549
reference_id
reference_type
scores
url http://secunia.com/advisories/30549
6
reference_url http://sourceforge.net/project/shownotes.php?release_id=604785
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=604785
7
reference_url http://sourceforge.net/project/shownotes.php?release_id=604837
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=604837
8
reference_url http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485
9
reference_url http://www.securityfocus.com/bid/29583
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29583
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=516295
reference_id 516295
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=516295
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-6072
reference_id CVE-2008-6072
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-6072
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.2.3-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.2.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.2.3-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2008-6072
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b8sr-p8he-5khf
53
url VCID-bawx-uzgx-yfdh
vulnerability_id VCID-bawx-uzgx-yfdh
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13737
reference_id
reference_type
scores
0
value 0.0183
scoring_system epss
scoring_elements 0.82946
published_at 2026-04-16T12:55:00Z
1
value 0.0183
scoring_system epss
scoring_elements 0.82907
published_at 2026-04-13T12:55:00Z
2
value 0.0183
scoring_system epss
scoring_elements 0.82842
published_at 2026-04-01T12:55:00Z
3
value 0.0183
scoring_system epss
scoring_elements 0.82858
published_at 2026-04-02T12:55:00Z
4
value 0.0183
scoring_system epss
scoring_elements 0.82871
published_at 2026-04-04T12:55:00Z
5
value 0.0183
scoring_system epss
scoring_elements 0.82867
published_at 2026-04-07T12:55:00Z
6
value 0.0183
scoring_system epss
scoring_elements 0.82892
published_at 2026-04-08T12:55:00Z
7
value 0.0183
scoring_system epss
scoring_elements 0.829
published_at 2026-04-09T12:55:00Z
8
value 0.0183
scoring_system epss
scoring_elements 0.82915
published_at 2026-04-11T12:55:00Z
9
value 0.0183
scoring_system epss
scoring_elements 0.8291
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13737
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878511
reference_id 878511
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878511
59
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-15?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-15%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-13737
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bawx-uzgx-yfdh
54
url VCID-bh46-tx2w-8bfq
vulnerability_id VCID-bh46-tx2w-8bfq
summary In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a stack-based buffer overflow in the function SVGStartElement of coders/svg.c, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a quoted font family value.
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/b6fb77d7d54d
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/b6fb77d7d54d
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11005
reference_id
reference_type
scores
0
value 0.02255
scoring_system epss
scoring_elements 0.8462
published_at 2026-04-16T12:55:00Z
1
value 0.02255
scoring_system epss
scoring_elements 0.84604
published_at 2026-04-12T12:55:00Z
2
value 0.02255
scoring_system epss
scoring_elements 0.846
published_at 2026-04-13T12:55:00Z
3
value 0.02255
scoring_system epss
scoring_elements 0.84522
published_at 2026-04-01T12:55:00Z
4
value 0.02255
scoring_system epss
scoring_elements 0.84537
published_at 2026-04-02T12:55:00Z
5
value 0.02255
scoring_system epss
scoring_elements 0.84559
published_at 2026-04-04T12:55:00Z
6
value 0.02255
scoring_system epss
scoring_elements 0.84562
published_at 2026-04-07T12:55:00Z
7
value 0.02255
scoring_system epss
scoring_elements 0.84584
published_at 2026-04-08T12:55:00Z
8
value 0.02255
scoring_system epss
scoring_elements 0.8459
published_at 2026-04-09T12:55:00Z
9
value 0.02255
scoring_system epss
scoring_elements 0.84609
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11005
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11005
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://sourceforge.net/p/graphicsmagick/bugs/600/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/600/
7
reference_url https://www.debian.org/security/2020/dsa-4640
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4640
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
reference_id 927029
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-11005
reference_id CVE-2019-11005
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-11005
13
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg15968-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-11005
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bh46-tx2w-8bfq
55
url VCID-c9cz-ebdv-t7eq
vulnerability_id VCID-c9cz-ebdv-t7eq
summary
Multiple vulnerabilities have been found in ImageMagick, the worst
    of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0726.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url http://rhn.redhat.com/errata/RHSA-2016-0726.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3718.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3718.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3718
reference_id
reference_type
scores
0
value 0.83834
scoring_system epss
scoring_elements 0.99297
published_at 2026-04-16T12:55:00Z
1
value 0.83834
scoring_system epss
scoring_elements 0.99287
published_at 2026-04-02T12:55:00Z
2
value 0.83834
scoring_system epss
scoring_elements 0.99289
published_at 2026-04-04T12:55:00Z
3
value 0.83834
scoring_system epss
scoring_elements 0.99292
published_at 2026-04-07T12:55:00Z
4
value 0.83834
scoring_system epss
scoring_elements 0.99293
published_at 2026-04-08T12:55:00Z
5
value 0.83834
scoring_system epss
scoring_elements 0.99294
published_at 2026-04-09T12:55:00Z
6
value 0.83834
scoring_system epss
scoring_elements 0.99295
published_at 2026-04-13T12:55:00Z
7
value 0.83834
scoring_system epss
scoring_elements 0.99296
published_at 2026-04-12T12:55:00Z
8
value 0.83834
scoring_system epss
scoring_elements 0.99286
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3718
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239
15
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
16
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3718
reference_id
reference_type
scores
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3718
17
reference_url https://www.exploit-db.com/exploits/39767/
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url https://www.exploit-db.com/exploits/39767/
18
reference_url https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
19
reference_url https://www.imagemagick.org/script/changelog.php
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url https://www.imagemagick.org/script/changelog.php
20
reference_url http://www.debian.org/security/2016/dsa-3580
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url http://www.debian.org/security/2016/dsa-3580
21
reference_url http://www.openwall.com/lists/oss-security/2016/05/03/18
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url http://www.openwall.com/lists/oss-security/2016/05/03/18
22
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
23
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
24
reference_url http://www.securityfocus.com/archive/1/538378/100/0/threaded
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url http://www.securityfocus.com/archive/1/538378/100/0/threaded
25
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
26
reference_url http://www.ubuntu.com/usn/USN-2990-1
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url http://www.ubuntu.com/usn/USN-2990-1
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1332802
reference_id 1332802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1332802
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3718
reference_id CVE-2016-3718
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-3718
113
reference_url https://security.gentoo.org/glsa/201611-21
reference_id GLSA-201611-21
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T13:27:43Z/
url https://security.gentoo.org/glsa/201611-21
114
reference_url https://access.redhat.com/errata/RHSA-2016:0726
reference_id RHSA-2016:0726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0726
115
reference_url https://usn.ubuntu.com/2990-1/
reference_id USN-2990-1
reference_type
scores
url https://usn.ubuntu.com/2990-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.24-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-3718
risk_score 10.0
exploitability 2.0
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9cz-ebdv-t7eq
56
url VCID-c9e3-p9my-9fhx
vulnerability_id VCID-c9e3-p9my-9fhx
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2318
reference_id
reference_type
scores
0
value 0.00236
scoring_system epss
scoring_elements 0.46456
published_at 2026-04-01T12:55:00Z
1
value 0.00236
scoring_system epss
scoring_elements 0.46494
published_at 2026-04-02T12:55:00Z
2
value 0.00236
scoring_system epss
scoring_elements 0.46513
published_at 2026-04-12T12:55:00Z
3
value 0.00236
scoring_system epss
scoring_elements 0.46462
published_at 2026-04-07T12:55:00Z
4
value 0.00236
scoring_system epss
scoring_elements 0.46518
published_at 2026-04-09T12:55:00Z
5
value 0.00236
scoring_system epss
scoring_elements 0.46541
published_at 2026-04-11T12:55:00Z
6
value 0.00236
scoring_system epss
scoring_elements 0.46522
published_at 2026-04-13T12:55:00Z
7
value 0.00236
scoring_system epss
scoring_elements 0.46579
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2318
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=814732
reference_id 814732
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=814732
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.24-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-2318
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9e3-p9my-9fhx
57
url VCID-cxs4-yude-jba3
vulnerability_id VCID-cxs4-yude-jba3
summary In GraphicsMagick from version 1.3.8 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WritePDBImage of coders/pdb.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to MagickBitStreamMSBWrite in magick/bit_stream.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11505
reference_id
reference_type
scores
0
value 0.01121
scoring_system epss
scoring_elements 0.78275
published_at 2026-04-16T12:55:00Z
1
value 0.01121
scoring_system epss
scoring_elements 0.78187
published_at 2026-04-01T12:55:00Z
2
value 0.01121
scoring_system epss
scoring_elements 0.78196
published_at 2026-04-02T12:55:00Z
3
value 0.01121
scoring_system epss
scoring_elements 0.78226
published_at 2026-04-04T12:55:00Z
4
value 0.01121
scoring_system epss
scoring_elements 0.78208
published_at 2026-04-07T12:55:00Z
5
value 0.01121
scoring_system epss
scoring_elements 0.78235
published_at 2026-04-08T12:55:00Z
6
value 0.01121
scoring_system epss
scoring_elements 0.7824
published_at 2026-04-09T12:55:00Z
7
value 0.01121
scoring_system epss
scoring_elements 0.78265
published_at 2026-04-11T12:55:00Z
8
value 0.01121
scoring_system epss
scoring_elements 0.78248
published_at 2026-04-12T12:55:00Z
9
value 0.01121
scoring_system epss
scoring_elements 0.78244
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11505
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11505
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg15968-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-11505
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cxs4-yude-jba3
58
url VCID-e93a-f3dq-xqg6
vulnerability_id VCID-e93a-f3dq-xqg6
summary , CVE-2008-6071, CVE-2008-6072, CVE-2008-6621 multiple security issues in ImageMagick
references
0
reference_url http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/pict.c
reference_id
reference_type
scores
url http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/pict.c
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-6071.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-6071.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-6071
reference_id
reference_type
scores
0
value 0.06081
scoring_system epss
scoring_elements 0.90784
published_at 2026-04-16T12:55:00Z
1
value 0.06081
scoring_system epss
scoring_elements 0.90716
published_at 2026-04-01T12:55:00Z
2
value 0.06081
scoring_system epss
scoring_elements 0.90722
published_at 2026-04-02T12:55:00Z
3
value 0.06081
scoring_system epss
scoring_elements 0.90732
published_at 2026-04-04T12:55:00Z
4
value 0.06081
scoring_system epss
scoring_elements 0.90743
published_at 2026-04-07T12:55:00Z
5
value 0.06081
scoring_system epss
scoring_elements 0.90754
published_at 2026-04-08T12:55:00Z
6
value 0.06081
scoring_system epss
scoring_elements 0.9076
published_at 2026-04-09T12:55:00Z
7
value 0.06081
scoring_system epss
scoring_elements 0.90768
published_at 2026-04-11T12:55:00Z
8
value 0.06081
scoring_system epss
scoring_elements 0.90767
published_at 2026-04-12T12:55:00Z
9
value 0.06081
scoring_system epss
scoring_elements 0.90765
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-6071
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6071
4
reference_url http://secunia.com/advisories/30549
reference_id
reference_type
scores
url http://secunia.com/advisories/30549
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/42906
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/42906
6
reference_url http://sourceforge.net/project/shownotes.php?release_id=604785
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=604785
7
reference_url http://sourceforge.net/project/shownotes.php?release_id=604837
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=604837
8
reference_url http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485
9
reference_url http://www.securityfocus.com/bid/29583
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29583
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=516295
reference_id 516295
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=516295
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-6071
reference_id CVE-2008-6071
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-6071
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.2.3-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.2.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.2.3-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2008-6071
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e93a-f3dq-xqg6
59
url VCID-e9bg-sduz-yyad
vulnerability_id VCID-e9bg-sduz-yyad
summary In GraphicsMagick 1.3.26, an allocation failure vulnerability was found in the function ReadMNGImage in coders/png.c when a small MNG file has a MEND chunk with a large length value.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13147
reference_id
reference_type
scores
0
value 0.00431
scoring_system epss
scoring_elements 0.6266
published_at 2026-04-16T12:55:00Z
1
value 0.00431
scoring_system epss
scoring_elements 0.62642
published_at 2026-04-12T12:55:00Z
2
value 0.00431
scoring_system epss
scoring_elements 0.62512
published_at 2026-04-01T12:55:00Z
3
value 0.00431
scoring_system epss
scoring_elements 0.6257
published_at 2026-04-02T12:55:00Z
4
value 0.00431
scoring_system epss
scoring_elements 0.62603
published_at 2026-04-04T12:55:00Z
5
value 0.00431
scoring_system epss
scoring_elements 0.62569
published_at 2026-04-07T12:55:00Z
6
value 0.00431
scoring_system epss
scoring_elements 0.62619
published_at 2026-04-13T12:55:00Z
7
value 0.00431
scoring_system epss
scoring_elements 0.62635
published_at 2026-04-09T12:55:00Z
8
value 0.00431
scoring_system epss
scoring_elements 0.62653
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13147
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13147
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://usn.ubuntu.com/4206-1/
reference_id USN-4206-1
reference_type
scores
url https://usn.ubuntu.com/4206-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-13147
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e9bg-sduz-yyad
60
url VCID-ebyn-hv86-8kdz
vulnerability_id VCID-ebyn-hv86-8kdz
summary Out of bound write in ImageMagick's XCF coder
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1096.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1096
reference_id
reference_type
scores
0
value 0.10772
scoring_system epss
scoring_elements 0.93312
published_at 2026-04-01T12:55:00Z
1
value 0.10772
scoring_system epss
scoring_elements 0.9332
published_at 2026-04-02T12:55:00Z
2
value 0.10772
scoring_system epss
scoring_elements 0.93326
published_at 2026-04-07T12:55:00Z
3
value 0.10772
scoring_system epss
scoring_elements 0.93334
published_at 2026-04-08T12:55:00Z
4
value 0.10772
scoring_system epss
scoring_elements 0.93339
published_at 2026-04-09T12:55:00Z
5
value 0.10772
scoring_system epss
scoring_elements 0.93343
published_at 2026-04-13T12:55:00Z
6
value 0.10772
scoring_system epss
scoring_elements 0.93342
published_at 2026-04-12T12:55:00Z
7
value 0.10772
scoring_system epss
scoring_elements 0.93361
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1096
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=286411
reference_id 286411
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=286411
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414370
reference_id 414370
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414370
5
reference_url https://access.redhat.com/errata/RHSA-2008:0145
reference_id RHSA-2008:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0145
6
reference_url https://usn.ubuntu.com/681-1/
reference_id USN-681-1
reference_type
scores
url https://usn.ubuntu.com/681-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.11-3.2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.11-3.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.11-3.2%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2008-1096
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ebyn-hv86-8kdz
61
url VCID-ed2w-d1d6-euca
vulnerability_id VCID-ed2w-d1d6-euca
summary security update
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=6fc54b6d2be8
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=6fc54b6d2be8
1
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=da135eaedc3b
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=da135eaedc3b
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15930
reference_id
reference_type
scores
0
value 0.00409
scoring_system epss
scoring_elements 0.61322
published_at 2026-04-12T12:55:00Z
1
value 0.00409
scoring_system epss
scoring_elements 0.61343
published_at 2026-04-16T12:55:00Z
2
value 0.00409
scoring_system epss
scoring_elements 0.61304
published_at 2026-04-13T12:55:00Z
3
value 0.00771
scoring_system epss
scoring_elements 0.73486
published_at 2026-04-07T12:55:00Z
4
value 0.00771
scoring_system epss
scoring_elements 0.73484
published_at 2026-04-01T12:55:00Z
5
value 0.00771
scoring_system epss
scoring_elements 0.73523
published_at 2026-04-08T12:55:00Z
6
value 0.00771
scoring_system epss
scoring_elements 0.73536
published_at 2026-04-09T12:55:00Z
7
value 0.00771
scoring_system epss
scoring_elements 0.7356
published_at 2026-04-11T12:55:00Z
8
value 0.00771
scoring_system epss
scoring_elements 0.73492
published_at 2026-04-02T12:55:00Z
9
value 0.00771
scoring_system epss
scoring_elements 0.73515
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
59
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
60
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
62
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
63
reference_url https://sourceforge.net/p/graphicsmagick/bugs/518/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/518/
64
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
65
reference_url http://www.securityfocus.com/bid/101607
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101607
66
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879999
reference_id 879999
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879999
67
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
68
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15930
reference_id CVE-2017-15930
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15930
73
reference_url https://usn.ubuntu.com/4232-1/
reference_id USN-4232-1
reference_type
scores
url https://usn.ubuntu.com/4232-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-16?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-16?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-16%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-15930
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ed2w-d1d6-euca
62
url VCID-ek9v-zmf4-u7aw
vulnerability_id VCID-ek9v-zmf4-u7aw
summary In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a memory leak in the function ReadMPCImage of coders/mpc.c, which allows attackers to cause a denial of service via a crafted image file.
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/a348d9661019
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/a348d9661019
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11010
reference_id
reference_type
scores
0
value 0.00605
scoring_system epss
scoring_elements 0.69631
published_at 2026-04-16T12:55:00Z
1
value 0.00605
scoring_system epss
scoring_elements 0.69606
published_at 2026-04-12T12:55:00Z
2
value 0.00605
scoring_system epss
scoring_elements 0.69592
published_at 2026-04-13T12:55:00Z
3
value 0.00605
scoring_system epss
scoring_elements 0.69526
published_at 2026-04-01T12:55:00Z
4
value 0.00605
scoring_system epss
scoring_elements 0.69537
published_at 2026-04-02T12:55:00Z
5
value 0.00605
scoring_system epss
scoring_elements 0.69553
published_at 2026-04-04T12:55:00Z
6
value 0.00605
scoring_system epss
scoring_elements 0.69532
published_at 2026-04-07T12:55:00Z
7
value 0.00605
scoring_system epss
scoring_elements 0.69582
published_at 2026-04-08T12:55:00Z
8
value 0.00605
scoring_system epss
scoring_elements 0.69599
published_at 2026-04-09T12:55:00Z
9
value 0.00605
scoring_system epss
scoring_elements 0.69621
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11010
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11010
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
7
reference_url https://sourceforge.net/p/graphicsmagick/bugs/601/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/601/
8
reference_url https://www.debian.org/security/2020/dsa-4640
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4640
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
reference_id 927029
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-11010
reference_id CVE-2019-11010
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-11010
15
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg15968-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-11010
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ek9v-zmf4-u7aw
63
url VCID-epd6-xsva-17ea
vulnerability_id VCID-epd6-xsva-17ea
summary
Multiple vulnerabilities have been discovered in ImageMagick, the
    worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1947.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1947
reference_id
reference_type
scores
0
value 0.06954
scoring_system epss
scoring_elements 0.91388
published_at 2026-04-01T12:55:00Z
1
value 0.06954
scoring_system epss
scoring_elements 0.91393
published_at 2026-04-02T12:55:00Z
2
value 0.06954
scoring_system epss
scoring_elements 0.91403
published_at 2026-04-04T12:55:00Z
3
value 0.06954
scoring_system epss
scoring_elements 0.9141
published_at 2026-04-07T12:55:00Z
4
value 0.06954
scoring_system epss
scoring_elements 0.91422
published_at 2026-04-08T12:55:00Z
5
value 0.06954
scoring_system epss
scoring_elements 0.91429
published_at 2026-04-09T12:55:00Z
6
value 0.06954
scoring_system epss
scoring_elements 0.91435
published_at 2026-04-11T12:55:00Z
7
value 0.06954
scoring_system epss
scoring_elements 0.91438
published_at 2026-04-12T12:55:00Z
8
value 0.06954
scoring_system epss
scoring_elements 0.91437
published_at 2026-04-13T12:55:00Z
9
value 0.06954
scoring_system epss
scoring_elements 0.9146
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1947
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1947
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1958
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2030
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1064098
reference_id 1064098
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1064098
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=740250
reference_id 740250
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=740250
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/31688.pl
reference_id CVE-2014-2030;OSVDB-103206;CVE-2014-1947
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/31688.pl
8
reference_url https://security.gentoo.org/glsa/201405-09
reference_id GLSA-201405-09
reference_type
scores
url https://security.gentoo.org/glsa/201405-09
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.20-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.20-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.20-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2014-1947
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-epd6-xsva-17ea
64
url VCID-ephb-spyf-c7d2
vulnerability_id VCID-ephb-spyf-c7d2
summary
Multiple buffer overflows have been discovered in ImageMagick, which could
    potentially result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3743.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3743
reference_id
reference_type
scores
0
value 0.02086
scoring_system epss
scoring_elements 0.83944
published_at 2026-04-01T12:55:00Z
1
value 0.02086
scoring_system epss
scoring_elements 0.83959
published_at 2026-04-02T12:55:00Z
2
value 0.02086
scoring_system epss
scoring_elements 0.83974
published_at 2026-04-04T12:55:00Z
3
value 0.02086
scoring_system epss
scoring_elements 0.83978
published_at 2026-04-07T12:55:00Z
4
value 0.02086
scoring_system epss
scoring_elements 0.84001
published_at 2026-04-08T12:55:00Z
5
value 0.02086
scoring_system epss
scoring_elements 0.84007
published_at 2026-04-09T12:55:00Z
6
value 0.02086
scoring_system epss
scoring_elements 0.84023
published_at 2026-04-11T12:55:00Z
7
value 0.02086
scoring_system epss
scoring_elements 0.84016
published_at 2026-04-12T12:55:00Z
8
value 0.02086
scoring_system epss
scoring_elements 0.84012
published_at 2026-04-13T12:55:00Z
9
value 0.02086
scoring_system epss
scoring_elements 0.84036
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3743
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618158
reference_id 1618158
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618158
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=385062
reference_id 385062
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=385062
5
reference_url https://security.gentoo.org/glsa/200609-14
reference_id GLSA-200609-14
reference_type
scores
url https://security.gentoo.org/glsa/200609-14
6
reference_url https://access.redhat.com/errata/RHSA-2006:0633
reference_id RHSA-2006:0633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0633
7
reference_url https://usn.ubuntu.com/340-1/
reference_id USN-340-1
reference_type
scores
url https://usn.ubuntu.com/340-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.7-8?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.7-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.7-8%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2006-3743
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ephb-spyf-c7d2
65
url VCID-ezcj-2yaf-rfhh
vulnerability_id VCID-ezcj-2yaf-rfhh
summary ImageMagick: memory leak in coders/dps.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16709.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16709.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16709
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40569
published_at 2026-04-01T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.40668
published_at 2026-04-16T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40677
published_at 2026-04-11T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.4064
published_at 2026-04-12T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40622
published_at 2026-04-13T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40651
published_at 2026-04-02T12:55:00Z
6
value 0.00188
scoring_system epss
scoring_elements 0.40679
published_at 2026-04-04T12:55:00Z
7
value 0.00188
scoring_system epss
scoring_elements 0.40599
published_at 2026-04-07T12:55:00Z
8
value 0.00188
scoring_system epss
scoring_elements 0.4065
published_at 2026-04-08T12:55:00Z
9
value 0.00188
scoring_system epss
scoring_elements 0.40659
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16709
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/ImageMagick/ImageMagick/issues/1531
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1531
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801661
reference_id 1801661
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801661
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:backports:sle-15:-:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:backports:sle-15:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:backports:sle-15:-:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16709
reference_id CVE-2019-16709
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-16709
20
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
21
reference_url https://usn.ubuntu.com/4192-1/
reference_id USN-4192-1
reference_type
scores
url https://usn.ubuntu.com/4192-1/
22
reference_url https://usn.ubuntu.com/7053-1/
reference_id USN-7053-1
reference_type
scores
url https://usn.ubuntu.com/7053-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.33%2Bhg16117-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.33%2Bhg16117-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.33%252Bhg16117-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-16709
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ezcj-2yaf-rfhh
66
url VCID-f3xk-3ejx-7qcp
vulnerability_id VCID-f3xk-3ejx-7qcp
summary security update
references
0
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/1366f2dd9931
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/1366f2dd9931
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17500
reference_id
reference_type
scores
0
value 0.02188
scoring_system epss
scoring_elements 0.844
published_at 2026-04-16T12:55:00Z
1
value 0.02188
scoring_system epss
scoring_elements 0.84383
published_at 2026-04-12T12:55:00Z
2
value 0.02188
scoring_system epss
scoring_elements 0.84379
published_at 2026-04-13T12:55:00Z
3
value 0.02188
scoring_system epss
scoring_elements 0.84307
published_at 2026-04-01T12:55:00Z
4
value 0.02188
scoring_system epss
scoring_elements 0.84321
published_at 2026-04-02T12:55:00Z
5
value 0.02188
scoring_system epss
scoring_elements 0.84342
published_at 2026-04-04T12:55:00Z
6
value 0.02188
scoring_system epss
scoring_elements 0.84345
published_at 2026-04-07T12:55:00Z
7
value 0.02188
scoring_system epss
scoring_elements 0.84366
published_at 2026-04-08T12:55:00Z
8
value 0.02188
scoring_system epss
scoring_elements 0.84372
published_at 2026-04-09T12:55:00Z
9
value 0.02188
scoring_system epss
scoring_elements 0.84389
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17500
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
60
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
62
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
63
reference_url https://sourceforge.net/p/graphicsmagick/bugs/523/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/523/
64
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
65
reference_url http://www.securityfocus.com/bid/102164
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102164
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17500
reference_id CVE-2017-17500
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17500
71
reference_url https://usn.ubuntu.com/4248-1/
reference_id USN-4248-1
reference_type
scores
url https://usn.ubuntu.com/4248-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-17500
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f3xk-3ejx-7qcp
67
url VCID-fvws-m1ay-aud1
vulnerability_id VCID-fvws-m1ay-aud1
summary
Multiple vulnerabilities have been found in GraphicsMagick,
    allowing remote attackers to execute arbitrary code or cause a Denial of
    Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1882.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1882.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1882
reference_id
reference_type
scores
0
value 0.03636
scoring_system epss
scoring_elements 0.87785
published_at 2026-04-01T12:55:00Z
1
value 0.03636
scoring_system epss
scoring_elements 0.87796
published_at 2026-04-02T12:55:00Z
2
value 0.03636
scoring_system epss
scoring_elements 0.87807
published_at 2026-04-04T12:55:00Z
3
value 0.03636
scoring_system epss
scoring_elements 0.8781
published_at 2026-04-07T12:55:00Z
4
value 0.03636
scoring_system epss
scoring_elements 0.87832
published_at 2026-04-08T12:55:00Z
5
value 0.03636
scoring_system epss
scoring_elements 0.87838
published_at 2026-04-09T12:55:00Z
6
value 0.03636
scoring_system epss
scoring_elements 0.8785
published_at 2026-04-11T12:55:00Z
7
value 0.03636
scoring_system epss
scoring_elements 0.87844
published_at 2026-04-12T12:55:00Z
8
value 0.03636
scoring_system epss
scoring_elements 0.87843
published_at 2026-04-13T12:55:00Z
9
value 0.03636
scoring_system epss
scoring_elements 0.87857
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1882
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1882
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=503017
reference_id 503017
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=503017
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=530838
reference_id 530838
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=530838
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=530946
reference_id 530946
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=530946
6
reference_url https://security.gentoo.org/glsa/201006-03
reference_id GLSA-201006-03
reference_type
scores
url https://security.gentoo.org/glsa/201006-03
7
reference_url https://security.gentoo.org/glsa/201311-10
reference_id GLSA-201311-10
reference_type
scores
url https://security.gentoo.org/glsa/201311-10
8
reference_url https://access.redhat.com/errata/RHSA-2010:0652
reference_id RHSA-2010:0652
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0652
9
reference_url https://access.redhat.com/errata/RHSA-2010:0653
reference_id RHSA-2010:0653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0653
10
reference_url https://usn.ubuntu.com/784-1/
reference_id USN-784-1
reference_type
scores
url https://usn.ubuntu.com/784-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.5-5.1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.5-5.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.5-5.1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2009-1882
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fvws-m1ay-aud1
68
url VCID-fy8j-91z5-97br
vulnerability_id VCID-fy8j-91z5-97br
summary security update
references
0
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/a9c425688397
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/a9c425688397
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17502
reference_id
reference_type
scores
0
value 0.00945
scoring_system epss
scoring_elements 0.76349
published_at 2026-04-16T12:55:00Z
1
value 0.00945
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-13T12:55:00Z
2
value 0.00945
scoring_system epss
scoring_elements 0.76248
published_at 2026-04-01T12:55:00Z
3
value 0.00945
scoring_system epss
scoring_elements 0.76252
published_at 2026-04-02T12:55:00Z
4
value 0.00945
scoring_system epss
scoring_elements 0.76282
published_at 2026-04-04T12:55:00Z
5
value 0.00945
scoring_system epss
scoring_elements 0.76262
published_at 2026-04-07T12:55:00Z
6
value 0.00945
scoring_system epss
scoring_elements 0.76294
published_at 2026-04-08T12:55:00Z
7
value 0.00945
scoring_system epss
scoring_elements 0.76308
published_at 2026-04-09T12:55:00Z
8
value 0.00945
scoring_system epss
scoring_elements 0.76335
published_at 2026-04-11T12:55:00Z
9
value 0.00945
scoring_system epss
scoring_elements 0.76313
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
59
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
60
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
62
reference_url https://sourceforge.net/p/graphicsmagick/bugs/521/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/521/
63
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17502
reference_id CVE-2017-17502
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17502
69
reference_url https://usn.ubuntu.com/4248-1/
reference_id USN-4248-1
reference_type
scores
url https://usn.ubuntu.com/4248-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-17502
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fy8j-91z5-97br
69
url VCID-g8eh-fz9z-wkds
vulnerability_id VCID-g8eh-fz9z-wkds
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7800
reference_id
reference_type
scores
0
value 0.02181
scoring_system epss
scoring_elements 0.84377
published_at 2026-04-16T12:55:00Z
1
value 0.02181
scoring_system epss
scoring_elements 0.84287
published_at 2026-04-01T12:55:00Z
2
value 0.02181
scoring_system epss
scoring_elements 0.843
published_at 2026-04-02T12:55:00Z
3
value 0.02181
scoring_system epss
scoring_elements 0.84319
published_at 2026-04-04T12:55:00Z
4
value 0.02181
scoring_system epss
scoring_elements 0.84321
published_at 2026-04-07T12:55:00Z
5
value 0.02181
scoring_system epss
scoring_elements 0.84343
published_at 2026-04-08T12:55:00Z
6
value 0.02181
scoring_system epss
scoring_elements 0.84348
published_at 2026-04-09T12:55:00Z
7
value 0.02181
scoring_system epss
scoring_elements 0.84366
published_at 2026-04-11T12:55:00Z
8
value 0.02181
scoring_system epss
scoring_elements 0.84359
published_at 2026-04-12T12:55:00Z
9
value 0.02181
scoring_system epss
scoring_elements 0.84355
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7800
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.25-3?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.25-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-3%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-7800
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g8eh-fz9z-wkds
70
url VCID-genb-nzkn-zfhv
vulnerability_id VCID-genb-nzkn-zfhv
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10800
reference_id
reference_type
scores
0
value 0.00323
scoring_system epss
scoring_elements 0.5547
published_at 2026-04-16T12:55:00Z
1
value 0.00323
scoring_system epss
scoring_elements 0.55434
published_at 2026-04-13T12:55:00Z
2
value 0.00323
scoring_system epss
scoring_elements 0.55293
published_at 2026-04-01T12:55:00Z
3
value 0.00323
scoring_system epss
scoring_elements 0.55407
published_at 2026-04-02T12:55:00Z
4
value 0.00323
scoring_system epss
scoring_elements 0.55432
published_at 2026-04-04T12:55:00Z
5
value 0.00323
scoring_system epss
scoring_elements 0.55411
published_at 2026-04-07T12:55:00Z
6
value 0.00323
scoring_system epss
scoring_elements 0.55462
published_at 2026-04-08T12:55:00Z
7
value 0.00323
scoring_system epss
scoring_elements 0.55463
published_at 2026-04-09T12:55:00Z
8
value 0.00323
scoring_system epss
scoring_elements 0.55473
published_at 2026-04-11T12:55:00Z
9
value 0.00323
scoring_system epss
scoring_elements 0.55452
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10800
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867060
reference_id 867060
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867060
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-10800
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-genb-nzkn-zfhv
71
url VCID-h6c4-8nhd-bbcj
vulnerability_id VCID-h6c4-8nhd-bbcj
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11139
reference_id
reference_type
scores
0
value 0.00472
scoring_system epss
scoring_elements 0.64547
published_at 2026-04-01T12:55:00Z
1
value 0.00472
scoring_system epss
scoring_elements 0.646
published_at 2026-04-02T12:55:00Z
2
value 0.00472
scoring_system epss
scoring_elements 0.64629
published_at 2026-04-04T12:55:00Z
3
value 0.00472
scoring_system epss
scoring_elements 0.64586
published_at 2026-04-07T12:55:00Z
4
value 0.00472
scoring_system epss
scoring_elements 0.64635
published_at 2026-04-08T12:55:00Z
5
value 0.00472
scoring_system epss
scoring_elements 0.64651
published_at 2026-04-09T12:55:00Z
6
value 0.00472
scoring_system epss
scoring_elements 0.64668
published_at 2026-04-11T12:55:00Z
7
value 0.00472
scoring_system epss
scoring_elements 0.64656
published_at 2026-04-12T12:55:00Z
8
value 0.00472
scoring_system epss
scoring_elements 0.64627
published_at 2026-04-13T12:55:00Z
9
value 0.00472
scoring_system epss
scoring_elements 0.64663
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11139
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-2%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-11139
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h6c4-8nhd-bbcj
72
url VCID-hehq-89y2-9bgm
vulnerability_id VCID-hehq-89y2-9bgm
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8683
reference_id
reference_type
scores
0
value 0.00292
scoring_system epss
scoring_elements 0.52469
published_at 2026-04-01T12:55:00Z
1
value 0.00292
scoring_system epss
scoring_elements 0.52515
published_at 2026-04-02T12:55:00Z
2
value 0.00292
scoring_system epss
scoring_elements 0.52542
published_at 2026-04-04T12:55:00Z
3
value 0.00292
scoring_system epss
scoring_elements 0.52508
published_at 2026-04-07T12:55:00Z
4
value 0.00292
scoring_system epss
scoring_elements 0.52561
published_at 2026-04-08T12:55:00Z
5
value 0.00292
scoring_system epss
scoring_elements 0.52556
published_at 2026-04-09T12:55:00Z
6
value 0.00292
scoring_system epss
scoring_elements 0.52607
published_at 2026-04-11T12:55:00Z
7
value 0.00292
scoring_system epss
scoring_elements 0.5259
published_at 2026-04-12T12:55:00Z
8
value 0.00292
scoring_system epss
scoring_elements 0.52575
published_at 2026-04-13T12:55:00Z
9
value 0.00292
scoring_system epss
scoring_elements 0.52615
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8683
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.25-5?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.25-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-5%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-8683
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hehq-89y2-9bgm
73
url VCID-hpze-7jwr-kffu
vulnerability_id VCID-hpze-7jwr-kffu
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7997
reference_id
reference_type
scores
0
value 0.01147
scoring_system epss
scoring_elements 0.78495
published_at 2026-04-16T12:55:00Z
1
value 0.01147
scoring_system epss
scoring_elements 0.78414
published_at 2026-04-01T12:55:00Z
2
value 0.01147
scoring_system epss
scoring_elements 0.7842
published_at 2026-04-02T12:55:00Z
3
value 0.01147
scoring_system epss
scoring_elements 0.78451
published_at 2026-04-04T12:55:00Z
4
value 0.01147
scoring_system epss
scoring_elements 0.78436
published_at 2026-04-07T12:55:00Z
5
value 0.01147
scoring_system epss
scoring_elements 0.78462
published_at 2026-04-08T12:55:00Z
6
value 0.01147
scoring_system epss
scoring_elements 0.78467
published_at 2026-04-09T12:55:00Z
7
value 0.01147
scoring_system epss
scoring_elements 0.78492
published_at 2026-04-11T12:55:00Z
8
value 0.01147
scoring_system epss
scoring_elements 0.78474
published_at 2026-04-12T12:55:00Z
9
value 0.01147
scoring_system epss
scoring_elements 0.78466
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7997
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.25-4?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.25-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-4%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-7997
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hpze-7jwr-kffu
74
url VCID-hta8-4prr-auca
vulnerability_id VCID-hta8-4prr-auca
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9830
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69431
published_at 2026-04-16T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69324
published_at 2026-04-01T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69336
published_at 2026-04-02T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69353
published_at 2026-04-04T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69333
published_at 2026-04-07T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69383
published_at 2026-04-08T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69399
published_at 2026-04-09T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69421
published_at 2026-04-11T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69406
published_at 2026-04-12T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69392
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9830
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847055
reference_id 847055
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847055
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.25-6?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.25-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-6%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-9830
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hta8-4prr-auca
75
url VCID-ja1e-sy49-abad
vulnerability_id VCID-ja1e-sy49-abad
summary security update
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/6dda3c33f35f
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/6dda3c33f35f
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17913
reference_id
reference_type
scores
0
value 0.00458
scoring_system epss
scoring_elements 0.6403
published_at 2026-04-16T12:55:00Z
1
value 0.00458
scoring_system epss
scoring_elements 0.63995
published_at 2026-04-13T12:55:00Z
2
value 0.00458
scoring_system epss
scoring_elements 0.63913
published_at 2026-04-01T12:55:00Z
3
value 0.00458
scoring_system epss
scoring_elements 0.63971
published_at 2026-04-02T12:55:00Z
4
value 0.00458
scoring_system epss
scoring_elements 0.63999
published_at 2026-04-04T12:55:00Z
5
value 0.00458
scoring_system epss
scoring_elements 0.63959
published_at 2026-04-07T12:55:00Z
6
value 0.00458
scoring_system epss
scoring_elements 0.64009
published_at 2026-04-08T12:55:00Z
7
value 0.00458
scoring_system epss
scoring_elements 0.64026
published_at 2026-04-09T12:55:00Z
8
value 0.00458
scoring_system epss
scoring_elements 0.64038
published_at 2026-04-11T12:55:00Z
9
value 0.00458
scoring_system epss
scoring_elements 0.64024
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17913
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://sourceforge.net/p/graphicsmagick/bugs/536/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/536/
59
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17913
reference_id CVE-2017-17913
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17913
63
reference_url https://usn.ubuntu.com/4266-1/
reference_id USN-4266-1
reference_type
scores
url https://usn.ubuntu.com/4266-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-3?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-3%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-17913
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ja1e-sy49-abad
76
url VCID-jhub-49ty-f3g2
vulnerability_id VCID-jhub-49ty-f3g2
summary security update
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/0d871e813a4f
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/0d871e813a4f
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17912
reference_id
reference_type
scores
0
value 0.00825
scoring_system epss
scoring_elements 0.74486
published_at 2026-04-16T12:55:00Z
1
value 0.00825
scoring_system epss
scoring_elements 0.74458
published_at 2026-04-12T12:55:00Z
2
value 0.00825
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-13T12:55:00Z
3
value 0.00825
scoring_system epss
scoring_elements 0.744
published_at 2026-04-01T12:55:00Z
4
value 0.00825
scoring_system epss
scoring_elements 0.74404
published_at 2026-04-02T12:55:00Z
5
value 0.00825
scoring_system epss
scoring_elements 0.74431
published_at 2026-04-04T12:55:00Z
6
value 0.00825
scoring_system epss
scoring_elements 0.74406
published_at 2026-04-07T12:55:00Z
7
value 0.00825
scoring_system epss
scoring_elements 0.74439
published_at 2026-04-08T12:55:00Z
8
value 0.00825
scoring_system epss
scoring_elements 0.74456
published_at 2026-04-09T12:55:00Z
9
value 0.00825
scoring_system epss
scoring_elements 0.74478
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17912
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
60
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
61
reference_url https://sourceforge.net/p/graphicsmagick/bugs/533/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/533/
62
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17912
reference_id CVE-2017-17912
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17912
68
reference_url https://usn.ubuntu.com/4266-1/
reference_id USN-4266-1
reference_type
scores
url https://usn.ubuntu.com/4266-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-3?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-3%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-17912
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jhub-49ty-f3g2
77
url VCID-jvwd-1k5f-jbb8
vulnerability_id VCID-jvwd-1k5f-jbb8
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13776
reference_id
reference_type
scores
0
value 0.01071
scoring_system epss
scoring_elements 0.77775
published_at 2026-04-16T12:55:00Z
1
value 0.01071
scoring_system epss
scoring_elements 0.77739
published_at 2026-04-12T12:55:00Z
2
value 0.01071
scoring_system epss
scoring_elements 0.77738
published_at 2026-04-13T12:55:00Z
3
value 0.01071
scoring_system epss
scoring_elements 0.77678
published_at 2026-04-01T12:55:00Z
4
value 0.01071
scoring_system epss
scoring_elements 0.77685
published_at 2026-04-02T12:55:00Z
5
value 0.01071
scoring_system epss
scoring_elements 0.77712
published_at 2026-04-04T12:55:00Z
6
value 0.01071
scoring_system epss
scoring_elements 0.77695
published_at 2026-04-07T12:55:00Z
7
value 0.01071
scoring_system epss
scoring_elements 0.77723
published_at 2026-04-08T12:55:00Z
8
value 0.01071
scoring_system epss
scoring_elements 0.77728
published_at 2026-04-09T12:55:00Z
9
value 0.01071
scoring_system epss
scoring_elements 0.77754
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13776
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
59
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
60
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-8?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-8%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-13776
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvwd-1k5f-jbb8
78
url VCID-k5jd-24qt-aqc6
vulnerability_id VCID-k5jd-24qt-aqc6
summary In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadXWDImage of coders/xwd.c, which allows attackers to cause a denial of service or information disclosure via a crafted image file.
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/7cff2b1792de
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/7cff2b1792de
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11009
reference_id
reference_type
scores
0
value 0.01329
scoring_system epss
scoring_elements 0.79964
published_at 2026-04-16T12:55:00Z
1
value 0.01329
scoring_system epss
scoring_elements 0.79944
published_at 2026-04-12T12:55:00Z
2
value 0.01329
scoring_system epss
scoring_elements 0.79936
published_at 2026-04-13T12:55:00Z
3
value 0.01329
scoring_system epss
scoring_elements 0.79888
published_at 2026-04-01T12:55:00Z
4
value 0.01329
scoring_system epss
scoring_elements 0.79895
published_at 2026-04-02T12:55:00Z
5
value 0.01329
scoring_system epss
scoring_elements 0.79916
published_at 2026-04-04T12:55:00Z
6
value 0.01329
scoring_system epss
scoring_elements 0.79903
published_at 2026-04-07T12:55:00Z
7
value 0.01329
scoring_system epss
scoring_elements 0.79932
published_at 2026-04-08T12:55:00Z
8
value 0.01329
scoring_system epss
scoring_elements 0.79941
published_at 2026-04-09T12:55:00Z
9
value 0.01329
scoring_system epss
scoring_elements 0.79961
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11009
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11009
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
11
reference_url https://sourceforge.net/p/graphicsmagick/bugs/597/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/597/
12
reference_url https://www.debian.org/security/2020/dsa-4640
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4640
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
reference_id 927029
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-11009
reference_id CVE-2019-11009
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-11009
19
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg15968-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-11009
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k5jd-24qt-aqc6
79
url VCID-kkum-yat8-23dc
vulnerability_id VCID-kkum-yat8-23dc
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10794
reference_id
reference_type
scores
0
value 0.00404
scoring_system epss
scoring_elements 0.61013
published_at 2026-04-16T12:55:00Z
1
value 0.00404
scoring_system epss
scoring_elements 0.60852
published_at 2026-04-01T12:55:00Z
2
value 0.00404
scoring_system epss
scoring_elements 0.60924
published_at 2026-04-02T12:55:00Z
3
value 0.00404
scoring_system epss
scoring_elements 0.60952
published_at 2026-04-04T12:55:00Z
4
value 0.00404
scoring_system epss
scoring_elements 0.60918
published_at 2026-04-07T12:55:00Z
5
value 0.00404
scoring_system epss
scoring_elements 0.60966
published_at 2026-04-08T12:55:00Z
6
value 0.00404
scoring_system epss
scoring_elements 0.60982
published_at 2026-04-09T12:55:00Z
7
value 0.00404
scoring_system epss
scoring_elements 0.61004
published_at 2026-04-11T12:55:00Z
8
value 0.00404
scoring_system epss
scoring_elements 0.60989
published_at 2026-04-12T12:55:00Z
9
value 0.00404
scoring_system epss
scoring_elements 0.6097
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10794
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867085
reference_id 867085
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867085
59
reference_url https://usn.ubuntu.com/4206-1/
reference_id USN-4206-1
reference_type
scores
url https://usn.ubuntu.com/4206-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-10794
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kkum-yat8-23dc
80
url VCID-kuah-363n-fkf7
vulnerability_id VCID-kuah-363n-fkf7
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177834.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177834.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html
2
reference_url http://marc.info/?l=graphicsmagick-commit&m=142283721604323&w=2
reference_id
reference_type
scores
url http://marc.info/?l=graphicsmagick-commit&m=142283721604323&w=2
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8808
reference_id
reference_type
scores
0
value 0.00294
scoring_system epss
scoring_elements 0.52723
published_at 2026-04-16T12:55:00Z
1
value 0.00294
scoring_system epss
scoring_elements 0.52699
published_at 2026-04-12T12:55:00Z
2
value 0.00294
scoring_system epss
scoring_elements 0.52684
published_at 2026-04-13T12:55:00Z
3
value 0.00294
scoring_system epss
scoring_elements 0.52584
published_at 2026-04-01T12:55:00Z
4
value 0.00294
scoring_system epss
scoring_elements 0.52628
published_at 2026-04-02T12:55:00Z
5
value 0.00294
scoring_system epss
scoring_elements 0.52654
published_at 2026-04-04T12:55:00Z
6
value 0.00294
scoring_system epss
scoring_elements 0.52621
published_at 2026-04-07T12:55:00Z
7
value 0.00294
scoring_system epss
scoring_elements 0.52671
published_at 2026-04-08T12:55:00Z
8
value 0.00294
scoring_system epss
scoring_elements 0.52665
published_at 2026-04-09T12:55:00Z
9
value 0.00294
scoring_system epss
scoring_elements 0.52716
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8808
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url http://www.debian.org/security/2016/dsa-3746
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3746
20
reference_url http://www.openwall.com/lists/oss-security/2016/02/06/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/02/06/1
21
reference_url http://www.openwall.com/lists/oss-security/2016/02/06/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/02/06/3
22
reference_url http://www.securityfocus.com/bid/83058
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83058
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8808
reference_id CVE-2015-8808
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8808
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.21-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.21-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.21-2%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2015-8808
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kuah-363n-fkf7
81
url VCID-m1ax-fcfs-r7a9
vulnerability_id VCID-m1ax-fcfs-r7a9
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18230.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18230.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18230
reference_id
reference_type
scores
0
value 0.01691
scoring_system epss
scoring_elements 0.82163
published_at 2026-04-01T12:55:00Z
1
value 0.01691
scoring_system epss
scoring_elements 0.82176
published_at 2026-04-02T12:55:00Z
2
value 0.01691
scoring_system epss
scoring_elements 0.82197
published_at 2026-04-04T12:55:00Z
3
value 0.01691
scoring_system epss
scoring_elements 0.82193
published_at 2026-04-07T12:55:00Z
4
value 0.01691
scoring_system epss
scoring_elements 0.82219
published_at 2026-04-08T12:55:00Z
5
value 0.01691
scoring_system epss
scoring_elements 0.82226
published_at 2026-04-09T12:55:00Z
6
value 0.01691
scoring_system epss
scoring_elements 0.82246
published_at 2026-04-11T12:55:00Z
7
value 0.01691
scoring_system epss
scoring_elements 0.82239
published_at 2026-04-12T12:55:00Z
8
value 0.01691
scoring_system epss
scoring_elements 0.82233
published_at 2026-04-13T12:55:00Z
9
value 0.01691
scoring_system epss
scoring_elements 0.82269
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18230
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1558743
reference_id 1558743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1558743
60
reference_url https://usn.ubuntu.com/4266-1/
reference_id USN-4266-1
reference_type
scores
url https://usn.ubuntu.com/4266-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-18230
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m1ax-fcfs-r7a9
82
url VCID-m775-3xw6-f7a7
vulnerability_id VCID-m775-3xw6-f7a7
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12935
reference_id
reference_type
scores
0
value 0.00461
scoring_system epss
scoring_elements 0.64179
published_at 2026-04-16T12:55:00Z
1
value 0.00461
scoring_system epss
scoring_elements 0.64172
published_at 2026-04-12T12:55:00Z
2
value 0.00461
scoring_system epss
scoring_elements 0.64143
published_at 2026-04-13T12:55:00Z
3
value 0.00461
scoring_system epss
scoring_elements 0.64061
published_at 2026-04-01T12:55:00Z
4
value 0.00461
scoring_system epss
scoring_elements 0.64117
published_at 2026-04-02T12:55:00Z
5
value 0.00461
scoring_system epss
scoring_elements 0.64145
published_at 2026-04-04T12:55:00Z
6
value 0.00461
scoring_system epss
scoring_elements 0.64104
published_at 2026-04-07T12:55:00Z
7
value 0.00461
scoring_system epss
scoring_elements 0.64155
published_at 2026-04-08T12:55:00Z
8
value 0.00461
scoring_system epss
scoring_elements 0.64171
published_at 2026-04-09T12:55:00Z
9
value 0.00461
scoring_system epss
scoring_elements 0.64183
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12935
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872576
reference_id 872576
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872576
59
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
60
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
61
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-6?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-6%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-12935
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m775-3xw6-f7a7
83
url VCID-m8uf-fcm6-z3ag
vulnerability_id VCID-m8uf-fcm6-z3ag
summary security update
references
0
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/e8086faa52d0
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/e8086faa52d0
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16545
reference_id
reference_type
scores
0
value 0.00379
scoring_system epss
scoring_elements 0.59394
published_at 2026-04-13T12:55:00Z
1
value 0.00379
scoring_system epss
scoring_elements 0.59426
published_at 2026-04-16T12:55:00Z
2
value 0.00379
scoring_system epss
scoring_elements 0.59429
published_at 2026-04-11T12:55:00Z
3
value 0.00379
scoring_system epss
scoring_elements 0.59413
published_at 2026-04-12T12:55:00Z
4
value 0.0066
scoring_system epss
scoring_elements 0.71029
published_at 2026-04-01T12:55:00Z
5
value 0.0066
scoring_system epss
scoring_elements 0.71086
published_at 2026-04-09T12:55:00Z
6
value 0.0066
scoring_system epss
scoring_elements 0.71073
published_at 2026-04-08T12:55:00Z
7
value 0.0066
scoring_system epss
scoring_elements 0.71038
published_at 2026-04-02T12:55:00Z
8
value 0.0066
scoring_system epss
scoring_elements 0.71056
published_at 2026-04-04T12:55:00Z
9
value 0.0066
scoring_system epss
scoring_elements 0.71031
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16545
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
59
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
60
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
61
reference_url https://sourceforge.net/p/graphicsmagick/bugs/519/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/519/
62
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16545
reference_id CVE-2017-16545
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16545
65
reference_url https://usn.ubuntu.com/4248-1/
reference_id USN-4248-1
reference_type
scores
url https://usn.ubuntu.com/4248-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-18?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-18?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-18%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-16545
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m8uf-fcm6-z3ag
84
url VCID-mhba-w1g3-rfdm
vulnerability_id VCID-mhba-w1g3-rfdm
summary security update
references
0
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/135bdcb88b8d
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/135bdcb88b8d
1
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/1b9e64a8901e
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/1b9e64a8901e
2
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/2a21cda3145b
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/2a21cda3145b
3
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/2b7c826d36af
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/2b7c826d36af
4
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/3dc7b4e3779d
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/3dc7b4e3779d
5
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/75245a215fff
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/75245a215fff
6
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/e8086faa52d0
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/e8086faa52d0
7
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/fcd3ed3394f6
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/fcd3ed3394f6
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16669
reference_id
reference_type
scores
0
value 0.00687
scoring_system epss
scoring_elements 0.71706
published_at 2026-04-13T12:55:00Z
1
value 0.00687
scoring_system epss
scoring_elements 0.7175
published_at 2026-04-16T12:55:00Z
2
value 0.00687
scoring_system epss
scoring_elements 0.71725
published_at 2026-04-12T12:55:00Z
3
value 0.00687
scoring_system epss
scoring_elements 0.71741
published_at 2026-04-11T12:55:00Z
4
value 0.01131
scoring_system epss
scoring_elements 0.78272
published_at 2026-04-01T12:55:00Z
5
value 0.01131
scoring_system epss
scoring_elements 0.78279
published_at 2026-04-02T12:55:00Z
6
value 0.01131
scoring_system epss
scoring_elements 0.78311
published_at 2026-04-04T12:55:00Z
7
value 0.01131
scoring_system epss
scoring_elements 0.78292
published_at 2026-04-07T12:55:00Z
8
value 0.01192
scoring_system epss
scoring_elements 0.78848
published_at 2026-04-09T12:55:00Z
9
value 0.01192
scoring_system epss
scoring_elements 0.78841
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16669
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
65
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00013.html
66
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
67
reference_url https://sourceforge.net/p/graphicsmagick/bugs/450/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/450/
68
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
69
reference_url http://www.securityfocus.com/bid/101795
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101795
70
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881391
reference_id 881391
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881391
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16669
reference_id CVE-2017-16669
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16669
76
reference_url https://usn.ubuntu.com/4248-1/
reference_id USN-4248-1
reference_type
scores
url https://usn.ubuntu.com/4248-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-19?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-19?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-19%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-16669
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mhba-w1g3-rfdm
85
url VCID-mqgj-96wb-3ka2
vulnerability_id VCID-mqgj-96wb-3ka2
summary The Utah RLE reader in GraphicsMagick before 1.3.25 allows remote attackers to cause a denial of service (CPU consumption or large memory allocations) via vectors involving the header information and the file size.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7448
reference_id
reference_type
scores
0
value 0.04138
scoring_system epss
scoring_elements 0.88668
published_at 2026-04-16T12:55:00Z
1
value 0.04138
scoring_system epss
scoring_elements 0.886
published_at 2026-04-01T12:55:00Z
2
value 0.04138
scoring_system epss
scoring_elements 0.88609
published_at 2026-04-02T12:55:00Z
3
value 0.04138
scoring_system epss
scoring_elements 0.88625
published_at 2026-04-04T12:55:00Z
4
value 0.04138
scoring_system epss
scoring_elements 0.88627
published_at 2026-04-07T12:55:00Z
5
value 0.04138
scoring_system epss
scoring_elements 0.88646
published_at 2026-04-08T12:55:00Z
6
value 0.04138
scoring_system epss
scoring_elements 0.8865
published_at 2026-04-09T12:55:00Z
7
value 0.04138
scoring_system epss
scoring_elements 0.88662
published_at 2026-04-11T12:55:00Z
8
value 0.04138
scoring_system epss
scoring_elements 0.88655
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7448
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7448
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.25-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.25-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-7448
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqgj-96wb-3ka2
86
url VCID-mw2s-6zec-8ucb
vulnerability_id VCID-mw2s-6zec-8ucb
summary In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the ReadMNGImage function of coders/png.c, which allows attackers to cause a denial of service or information disclosure via an image colormap.
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/40fc71472b98
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/40fc71472b98
1
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/86a9295e7c83
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/86a9295e7c83
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11007
reference_id
reference_type
scores
0
value 0.02106
scoring_system epss
scoring_elements 0.8411
published_at 2026-04-16T12:55:00Z
1
value 0.02106
scoring_system epss
scoring_elements 0.84088
published_at 2026-04-13T12:55:00Z
2
value 0.02106
scoring_system epss
scoring_elements 0.84019
published_at 2026-04-01T12:55:00Z
3
value 0.02106
scoring_system epss
scoring_elements 0.84033
published_at 2026-04-02T12:55:00Z
4
value 0.02106
scoring_system epss
scoring_elements 0.84049
published_at 2026-04-04T12:55:00Z
5
value 0.02106
scoring_system epss
scoring_elements 0.84052
published_at 2026-04-07T12:55:00Z
6
value 0.02106
scoring_system epss
scoring_elements 0.84075
published_at 2026-04-08T12:55:00Z
7
value 0.02106
scoring_system epss
scoring_elements 0.84082
published_at 2026-04-09T12:55:00Z
8
value 0.02106
scoring_system epss
scoring_elements 0.84099
published_at 2026-04-11T12:55:00Z
9
value 0.02106
scoring_system epss
scoring_elements 0.84093
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11007
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11007
8
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
9
reference_url https://sourceforge.net/p/graphicsmagick/bugs/596/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/596/
10
reference_url https://www.debian.org/security/2020/dsa-4640
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4640
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
reference_id 927029
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-11007
reference_id CVE-2019-11007
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-11007
21
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg15968-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-11007
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mw2s-6zec-8ucb
87
url VCID-n7z7-zq3w-57cf
vulnerability_id VCID-n7z7-zq3w-57cf
summary The TIFFGetField function in coders/tiff.c in GraphicsMagick 1.3.24 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a file containing an "unterminated" string.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7449
reference_id
reference_type
scores
0
value 0.03259
scoring_system epss
scoring_elements 0.87152
published_at 2026-04-16T12:55:00Z
1
value 0.03259
scoring_system epss
scoring_elements 0.87084
published_at 2026-04-01T12:55:00Z
2
value 0.03259
scoring_system epss
scoring_elements 0.87095
published_at 2026-04-02T12:55:00Z
3
value 0.03259
scoring_system epss
scoring_elements 0.87112
published_at 2026-04-04T12:55:00Z
4
value 0.03259
scoring_system epss
scoring_elements 0.87105
published_at 2026-04-07T12:55:00Z
5
value 0.03259
scoring_system epss
scoring_elements 0.87126
published_at 2026-04-08T12:55:00Z
6
value 0.03259
scoring_system epss
scoring_elements 0.87133
published_at 2026-04-09T12:55:00Z
7
value 0.03259
scoring_system epss
scoring_elements 0.87146
published_at 2026-04-11T12:55:00Z
8
value 0.03259
scoring_system epss
scoring_elements 0.87141
published_at 2026-04-12T12:55:00Z
9
value 0.03259
scoring_system epss
scoring_elements 0.87136
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7449
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7449
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.25-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.25-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-7449
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7z7-zq3w-57cf
88
url VCID-p84t-bztf-cqdz
vulnerability_id VCID-p84t-bztf-cqdz
summary
Multiple vulnerabilities have been discovered in ImageMagick, possibly
    resulting in arbitrary code execution or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4986.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4986.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4986
reference_id
reference_type
scores
0
value 0.01545
scoring_system epss
scoring_elements 0.81328
published_at 2026-04-01T12:55:00Z
1
value 0.01545
scoring_system epss
scoring_elements 0.81337
published_at 2026-04-02T12:55:00Z
2
value 0.01545
scoring_system epss
scoring_elements 0.81359
published_at 2026-04-04T12:55:00Z
3
value 0.01545
scoring_system epss
scoring_elements 0.81358
published_at 2026-04-07T12:55:00Z
4
value 0.01545
scoring_system epss
scoring_elements 0.81387
published_at 2026-04-08T12:55:00Z
5
value 0.01545
scoring_system epss
scoring_elements 0.81392
published_at 2026-04-09T12:55:00Z
6
value 0.01545
scoring_system epss
scoring_elements 0.81413
published_at 2026-04-11T12:55:00Z
7
value 0.01545
scoring_system epss
scoring_elements 0.81401
published_at 2026-04-12T12:55:00Z
8
value 0.01545
scoring_system epss
scoring_elements 0.81393
published_at 2026-04-13T12:55:00Z
9
value 0.01545
scoring_system epss
scoring_elements 0.8143
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4986
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=310121
reference_id 310121
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=310121
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444266
reference_id 444266
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444266
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444267
reference_id 444267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444267
6
reference_url https://security.gentoo.org/glsa/200710-27
reference_id GLSA-200710-27
reference_type
scores
url https://security.gentoo.org/glsa/200710-27
7
reference_url https://access.redhat.com/errata/RHSA-2008:0145
reference_id RHSA-2008:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0145
8
reference_url https://access.redhat.com/errata/RHSA-2008:0165
reference_id RHSA-2008:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0165
9
reference_url https://usn.ubuntu.com/523-1/
reference_id USN-523-1
reference_type
scores
url https://usn.ubuntu.com/523-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.11-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.11-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2007-4986
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p84t-bztf-cqdz
89
url VCID-pure-cath-k7bd
vulnerability_id VCID-pure-cath-k7bd
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8682
reference_id
reference_type
scores
0
value 0.01784
scoring_system epss
scoring_elements 0.8266
published_at 2026-04-01T12:55:00Z
1
value 0.01784
scoring_system epss
scoring_elements 0.82676
published_at 2026-04-02T12:55:00Z
2
value 0.01784
scoring_system epss
scoring_elements 0.8269
published_at 2026-04-04T12:55:00Z
3
value 0.01784
scoring_system epss
scoring_elements 0.82686
published_at 2026-04-07T12:55:00Z
4
value 0.01784
scoring_system epss
scoring_elements 0.82712
published_at 2026-04-08T12:55:00Z
5
value 0.01784
scoring_system epss
scoring_elements 0.82719
published_at 2026-04-09T12:55:00Z
6
value 0.01784
scoring_system epss
scoring_elements 0.82736
published_at 2026-04-11T12:55:00Z
7
value 0.01784
scoring_system epss
scoring_elements 0.82731
published_at 2026-04-12T12:55:00Z
8
value 0.01784
scoring_system epss
scoring_elements 0.82727
published_at 2026-04-13T12:55:00Z
9
value 0.01784
scoring_system epss
scoring_elements 0.82766
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8682
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.25-5?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.25-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-5%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-8682
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pure-cath-k7bd
90
url VCID-q5su-zt4m-sqgx
vulnerability_id VCID-q5su-zt4m-sqgx
summary ImageMagick: out-of-bounds memory access in PCX parser
references
0
reference_url http://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8355.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8355.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8355
reference_id
reference_type
scores
0
value 0.0047
scoring_system epss
scoring_elements 0.64613
published_at 2026-04-16T12:55:00Z
1
value 0.0047
scoring_system epss
scoring_elements 0.64578
published_at 2026-04-13T12:55:00Z
2
value 0.0047
scoring_system epss
scoring_elements 0.64497
published_at 2026-04-01T12:55:00Z
3
value 0.0047
scoring_system epss
scoring_elements 0.6455
published_at 2026-04-02T12:55:00Z
4
value 0.0047
scoring_system epss
scoring_elements 0.64579
published_at 2026-04-04T12:55:00Z
5
value 0.0047
scoring_system epss
scoring_elements 0.64537
published_at 2026-04-07T12:55:00Z
6
value 0.0047
scoring_system epss
scoring_elements 0.64585
published_at 2026-04-08T12:55:00Z
7
value 0.0047
scoring_system epss
scoring_elements 0.64602
published_at 2026-04-09T12:55:00Z
8
value 0.0047
scoring_system epss
scoring_elements 0.64619
published_at 2026-04-11T12:55:00Z
9
value 0.0047
scoring_system epss
scoring_elements 0.64607
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8355
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8355
4
reference_url https://int21.de/cve/CVE-2014-8355-ImageMagick-pcx-oob-heap-overflow.html
reference_id
reference_type
scores
url https://int21.de/cve/CVE-2014-8355-ImageMagick-pcx-oob-heap-overflow.html
5
reference_url http://www.securityfocus.com/bid/70839
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70839
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1158523
reference_id 1158523
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1158523
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=767240
reference_id 767240
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=767240
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778238
reference_id 778238
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778238
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8355
reference_id CVE-2014-8355
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2014-8355
11
reference_url https://usn.ubuntu.com/3131-1/
reference_id USN-3131-1
reference_type
scores
url https://usn.ubuntu.com/3131-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.20-3%2Bdeb8u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.20-3%2Bdeb8u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.20-3%252Bdeb8u1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2014-8355
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5su-zt4m-sqgx
91
url VCID-q9kb-tjhv-6qcp
vulnerability_id VCID-q9kb-tjhv-6qcp
summary security update
references
0
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/f1c418ef0260
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/f1c418ef0260
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17498
reference_id
reference_type
scores
0
value 0.00714
scoring_system epss
scoring_elements 0.72287
published_at 2026-04-01T12:55:00Z
1
value 0.00714
scoring_system epss
scoring_elements 0.72293
published_at 2026-04-02T12:55:00Z
2
value 0.00714
scoring_system epss
scoring_elements 0.72312
published_at 2026-04-04T12:55:00Z
3
value 0.00714
scoring_system epss
scoring_elements 0.72288
published_at 2026-04-07T12:55:00Z
4
value 0.00714
scoring_system epss
scoring_elements 0.72327
published_at 2026-04-08T12:55:00Z
5
value 0.00753
scoring_system epss
scoring_elements 0.73219
published_at 2026-04-11T12:55:00Z
6
value 0.00753
scoring_system epss
scoring_elements 0.732
published_at 2026-04-12T12:55:00Z
7
value 0.00753
scoring_system epss
scoring_elements 0.73236
published_at 2026-04-16T12:55:00Z
8
value 0.00753
scoring_system epss
scoring_elements 0.73194
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17498
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
60
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
62
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
63
reference_url https://sourceforge.net/p/graphicsmagick/bugs/525/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/525/
64
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
65
reference_url http://www.securityfocus.com/bid/102158
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102158
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17498
reference_id CVE-2017-17498
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17498
68
reference_url https://usn.ubuntu.com/4248-1/
reference_id USN-4248-1
reference_type
scores
url https://usn.ubuntu.com/4248-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-17498
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q9kb-tjhv-6qcp
92
url VCID-qfut-6r5k-aqb6
vulnerability_id VCID-qfut-6r5k-aqb6
summary security update
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=fb09ca6dd22c
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=fb09ca6dd22c
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14504
reference_id
reference_type
scores
0
value 0.01
scoring_system epss
scoring_elements 0.7702
published_at 2026-04-16T12:55:00Z
1
value 0.01
scoring_system epss
scoring_elements 0.76979
published_at 2026-04-13T12:55:00Z
2
value 0.01
scoring_system epss
scoring_elements 0.76917
published_at 2026-04-01T12:55:00Z
3
value 0.01
scoring_system epss
scoring_elements 0.76923
published_at 2026-04-02T12:55:00Z
4
value 0.01
scoring_system epss
scoring_elements 0.76952
published_at 2026-04-04T12:55:00Z
5
value 0.01
scoring_system epss
scoring_elements 0.76934
published_at 2026-04-07T12:55:00Z
6
value 0.01
scoring_system epss
scoring_elements 0.76967
published_at 2026-04-08T12:55:00Z
7
value 0.01
scoring_system epss
scoring_elements 0.76978
published_at 2026-04-09T12:55:00Z
8
value 0.01
scoring_system epss
scoring_elements 0.77005
published_at 2026-04-11T12:55:00Z
9
value 0.01
scoring_system epss
scoring_elements 0.76984
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14504
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
59
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
60
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
61
reference_url https://sourceforge.net/p/graphicsmagick/bugs/465/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/465/
62
reference_url https://sourceforge.net/p/graphicsmagick/bugs/466/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/466/
63
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
64
reference_url http://www.securityfocus.com/bid/100877
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100877
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14504
reference_id CVE-2017-14504
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-14504
69
reference_url https://usn.ubuntu.com/4232-1/
reference_id USN-4232-1
reference_type
scores
url https://usn.ubuntu.com/4232-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-11?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-11%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-14504
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qfut-6r5k-aqb6
93
url VCID-qh3z-vna7-87h2
vulnerability_id VCID-qh3z-vna7-87h2
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12921
reference_id
reference_type
scores
0
value 0.05729
scoring_system epss
scoring_elements 0.90456
published_at 2026-04-16T12:55:00Z
1
value 0.05729
scoring_system epss
scoring_elements 0.90448
published_at 2026-04-11T12:55:00Z
2
value 0.05729
scoring_system epss
scoring_elements 0.90447
published_at 2026-04-12T12:55:00Z
3
value 0.05729
scoring_system epss
scoring_elements 0.904
published_at 2026-04-01T12:55:00Z
4
value 0.05729
scoring_system epss
scoring_elements 0.90404
published_at 2026-04-02T12:55:00Z
5
value 0.05729
scoring_system epss
scoring_elements 0.90416
published_at 2026-04-04T12:55:00Z
6
value 0.05729
scoring_system epss
scoring_elements 0.9042
published_at 2026-04-07T12:55:00Z
7
value 0.05729
scoring_system epss
scoring_elements 0.90434
published_at 2026-04-08T12:55:00Z
8
value 0.05729
scoring_system epss
scoring_elements 0.9044
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12921
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12921
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10938
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md
reference_id
reference_type
scores
url https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md
7
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00026.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/03/msg00026.html
8
reference_url https://www.debian.org/security/2020/dsa-4675
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4675
9
reference_url http://www.graphicsmagick.org/
reference_id
reference_type
scores
url http://www.graphicsmagick.org/
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-12921
reference_id CVE-2019-12921
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-12921
17
reference_url https://usn.ubuntu.com/USN-5190-1/
reference_id USN-USN-5190-1
reference_type
scores
url https://usn.ubuntu.com/USN-5190-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg16039-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg16039-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg16039-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-12921
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qh3z-vna7-87h2
94
url VCID-qjb4-qzar-e7ew
vulnerability_id VCID-qjb4-qzar-e7ew
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12937
reference_id
reference_type
scores
0
value 0.0095
scoring_system epss
scoring_elements 0.76412
published_at 2026-04-16T12:55:00Z
1
value 0.0095
scoring_system epss
scoring_elements 0.76377
published_at 2026-04-12T12:55:00Z
2
value 0.0095
scoring_system epss
scoring_elements 0.76372
published_at 2026-04-13T12:55:00Z
3
value 0.0095
scoring_system epss
scoring_elements 0.76314
published_at 2026-04-01T12:55:00Z
4
value 0.0095
scoring_system epss
scoring_elements 0.76317
published_at 2026-04-02T12:55:00Z
5
value 0.0095
scoring_system epss
scoring_elements 0.76347
published_at 2026-04-04T12:55:00Z
6
value 0.0095
scoring_system epss
scoring_elements 0.76327
published_at 2026-04-07T12:55:00Z
7
value 0.0095
scoring_system epss
scoring_elements 0.76359
published_at 2026-04-08T12:55:00Z
8
value 0.0095
scoring_system epss
scoring_elements 0.76373
published_at 2026-04-09T12:55:00Z
9
value 0.0095
scoring_system epss
scoring_elements 0.76399
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12937
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872574
reference_id 872574
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872574
59
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
60
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
61
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-6?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-6%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-12937
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qjb4-qzar-e7ew
95
url VCID-qjhw-tswt-m3ak
vulnerability_id VCID-qjhw-tswt-m3ak
summary In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer overflow in the function WriteXWDImage of coders/xwd.c, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file.
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/d823d23a474b
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/d823d23a474b
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11008
reference_id
reference_type
scores
0
value 0.02084
scoring_system epss
scoring_elements 0.84024
published_at 2026-04-16T12:55:00Z
1
value 0.02084
scoring_system epss
scoring_elements 0.84004
published_at 2026-04-12T12:55:00Z
2
value 0.02084
scoring_system epss
scoring_elements 0.84
published_at 2026-04-13T12:55:00Z
3
value 0.02084
scoring_system epss
scoring_elements 0.83932
published_at 2026-04-01T12:55:00Z
4
value 0.02084
scoring_system epss
scoring_elements 0.83946
published_at 2026-04-02T12:55:00Z
5
value 0.02084
scoring_system epss
scoring_elements 0.83962
published_at 2026-04-04T12:55:00Z
6
value 0.02084
scoring_system epss
scoring_elements 0.83964
published_at 2026-04-07T12:55:00Z
7
value 0.02084
scoring_system epss
scoring_elements 0.83987
published_at 2026-04-08T12:55:00Z
8
value 0.02084
scoring_system epss
scoring_elements 0.83994
published_at 2026-04-09T12:55:00Z
9
value 0.02084
scoring_system epss
scoring_elements 0.84009
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11008
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11008
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
12
reference_url https://sourceforge.net/p/graphicsmagick/bugs/599/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/599/
13
reference_url https://www.debian.org/security/2020/dsa-4640
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4640
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
reference_id 927029
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-11008
reference_id CVE-2019-11008
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-11008
24
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg15968-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-11008
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qjhw-tswt-m3ak
96
url VCID-qmwk-2tw3-cfet
vulnerability_id VCID-qmwk-2tw3-cfet
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11643
reference_id
reference_type
scores
0
value 0.00511
scoring_system epss
scoring_elements 0.66477
published_at 2026-04-16T12:55:00Z
1
value 0.00511
scoring_system epss
scoring_elements 0.66442
published_at 2026-04-13T12:55:00Z
2
value 0.00511
scoring_system epss
scoring_elements 0.66367
published_at 2026-04-01T12:55:00Z
3
value 0.00511
scoring_system epss
scoring_elements 0.66406
published_at 2026-04-02T12:55:00Z
4
value 0.00511
scoring_system epss
scoring_elements 0.66432
published_at 2026-04-04T12:55:00Z
5
value 0.00511
scoring_system epss
scoring_elements 0.66403
published_at 2026-04-07T12:55:00Z
6
value 0.00511
scoring_system epss
scoring_elements 0.66451
published_at 2026-04-08T12:55:00Z
7
value 0.00511
scoring_system epss
scoring_elements 0.66465
published_at 2026-04-09T12:55:00Z
8
value 0.00511
scoring_system epss
scoring_elements 0.66485
published_at 2026-04-11T12:55:00Z
9
value 0.00511
scoring_system epss
scoring_elements 0.66472
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11643
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870157
reference_id 870157
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870157
59
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-4?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-4%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-11643
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qmwk-2tw3-cfet
97
url VCID-qsna-fp92-syce
vulnerability_id VCID-qsna-fp92-syce
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0981.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0981.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0981
reference_id
reference_type
scores
0
value 0.07221
scoring_system epss
scoring_elements 0.91639
published_at 2026-04-16T12:55:00Z
1
value 0.07221
scoring_system epss
scoring_elements 0.91574
published_at 2026-04-01T12:55:00Z
2
value 0.07221
scoring_system epss
scoring_elements 0.91581
published_at 2026-04-02T12:55:00Z
3
value 0.07221
scoring_system epss
scoring_elements 0.91587
published_at 2026-04-04T12:55:00Z
4
value 0.07221
scoring_system epss
scoring_elements 0.91596
published_at 2026-04-07T12:55:00Z
5
value 0.07221
scoring_system epss
scoring_elements 0.91609
published_at 2026-04-08T12:55:00Z
6
value 0.07221
scoring_system epss
scoring_elements 0.91615
published_at 2026-04-09T12:55:00Z
7
value 0.07221
scoring_system epss
scoring_elements 0.91619
published_at 2026-04-11T12:55:00Z
8
value 0.07221
scoring_system epss
scoring_elements 0.91621
published_at 2026-04-12T12:55:00Z
9
value 0.07221
scoring_system epss
scoring_elements 0.91618
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0981
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0981
3
reference_url http://secunia.com/advisories/12995/
reference_id
reference_type
scores
url http://secunia.com/advisories/12995/
4
reference_url http://security.gentoo.org/glsa/glsa-200411-11.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200411-11.xml
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/17903
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/17903
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10472
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10472
7
reference_url https://www.ubuntu.com/usn/usn-7-1/
reference_id
reference_type
scores
url https://www.ubuntu.com/usn/usn-7-1/
8
reference_url http://www.imagemagick.org/www/Changelog.html
reference_id
reference_type
scores
url http://www.imagemagick.org/www/Changelog.html
9
reference_url http://www.securityfocus.org/bid/11548
reference_id
reference_type
scores
url http://www.securityfocus.org/bid/11548
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617341
reference_id 1617341
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617341
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278401
reference_id 278401
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278401
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.8:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-0981
reference_id CVE-2004-0981
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-0981
49
reference_url https://access.redhat.com/errata/RHSA-2004:636
reference_id RHSA-2004:636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:636
50
reference_url https://usn.ubuntu.com/10-1/
reference_id USN-10-1
reference_type
scores
url https://usn.ubuntu.com/10-1/
51
reference_url https://usn.ubuntu.com/7-1/
reference_id USN-7-1
reference_type
scores
url https://usn.ubuntu.com/7-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.7-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.7-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2004-0981
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qsna-fp92-syce
98
url VCID-qtv6-ta8r-pka7
vulnerability_id VCID-qtv6-ta8r-pka7
summary In GraphicsMagick 1.4 snapshot-20181209 Q8, there is a heap-based buffer overflow in the WriteTGAImage function of tga.c, which allows attackers to cause a denial of service via a crafted image file, because the number of rows or columns can exceed the pixel-dimension restrictions of the TGA specification.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20184
reference_id
reference_type
scores
0
value 0.00711
scoring_system epss
scoring_elements 0.72281
published_at 2026-04-16T12:55:00Z
1
value 0.00711
scoring_system epss
scoring_elements 0.72196
published_at 2026-04-01T12:55:00Z
2
value 0.00711
scoring_system epss
scoring_elements 0.72201
published_at 2026-04-02T12:55:00Z
3
value 0.00711
scoring_system epss
scoring_elements 0.72221
published_at 2026-04-04T12:55:00Z
4
value 0.00711
scoring_system epss
scoring_elements 0.72197
published_at 2026-04-07T12:55:00Z
5
value 0.00711
scoring_system epss
scoring_elements 0.72233
published_at 2026-04-08T12:55:00Z
6
value 0.00711
scoring_system epss
scoring_elements 0.72246
published_at 2026-04-09T12:55:00Z
7
value 0.00711
scoring_system epss
scoring_elements 0.72268
published_at 2026-04-11T12:55:00Z
8
value 0.00711
scoring_system epss
scoring_elements 0.72252
published_at 2026-04-12T12:55:00Z
9
value 0.00711
scoring_system epss
scoring_elements 0.72238
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20184
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20184
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916721
reference_id 916721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916721
4
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
5
reference_url https://usn.ubuntu.com/5974-1/
reference_id USN-5974-1
reference_type
scores
url https://usn.ubuntu.com/5974-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg15873-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg15873-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg15873-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2018-20184
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtv6-ta8r-pka7
99
url VCID-qxe7-vuy5-9ycg
vulnerability_id VCID-qxe7-vuy5-9ycg
summary
Multiple buffer overflows have been discovered in ImageMagick, which could
    potentially result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4144.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4144.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4144
reference_id
reference_type
scores
0
value 0.19082
scoring_system epss
scoring_elements 0.95302
published_at 2026-04-01T12:55:00Z
1
value 0.19082
scoring_system epss
scoring_elements 0.95313
published_at 2026-04-02T12:55:00Z
2
value 0.19082
scoring_system epss
scoring_elements 0.95319
published_at 2026-04-04T12:55:00Z
3
value 0.19082
scoring_system epss
scoring_elements 0.95324
published_at 2026-04-07T12:55:00Z
4
value 0.19082
scoring_system epss
scoring_elements 0.95331
published_at 2026-04-08T12:55:00Z
5
value 0.19082
scoring_system epss
scoring_elements 0.95334
published_at 2026-04-09T12:55:00Z
6
value 0.19082
scoring_system epss
scoring_elements 0.95339
published_at 2026-04-12T12:55:00Z
7
value 0.19082
scoring_system epss
scoring_elements 0.95341
published_at 2026-04-13T12:55:00Z
8
value 0.19082
scoring_system epss
scoring_elements 0.95349
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4144
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4144
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618176
reference_id 1618176
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618176
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383314
reference_id 383314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383314
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383333
reference_id 383333
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383333
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/28383.txt
reference_id CVE-2006-4144;OSVDB-27951
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/28383.txt
7
reference_url https://www.securityfocus.com/bid/19507/info
reference_id CVE-2006-4144;OSVDB-27951
reference_type exploit
scores
url https://www.securityfocus.com/bid/19507/info
8
reference_url https://security.gentoo.org/glsa/200609-14
reference_id GLSA-200609-14
reference_type
scores
url https://security.gentoo.org/glsa/200609-14
9
reference_url https://access.redhat.com/errata/RHSA-2006:0633
reference_id RHSA-2006:0633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0633
10
reference_url https://usn.ubuntu.com/337-1/
reference_id USN-337-1
reference_type
scores
url https://usn.ubuntu.com/337-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.7-7?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.7-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.7-7%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2006-4144
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qxe7-vuy5-9ycg
100
url VCID-r2pq-4trw-13ab
vulnerability_id VCID-r2pq-4trw-13ab
summary ReadWPGImage in WPG in GraphicsMagick before 1.3.46 mishandles palette buffer allocation, resulting in out-of-bounds access to heap memory in ReadBlob.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27796
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20083
published_at 2026-04-16T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.32039
published_at 2026-04-02T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.3208
published_at 2026-04-04T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31903
published_at 2026-04-07T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31956
published_at 2026-04-08T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31984
published_at 2026-04-09T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31988
published_at 2026-04-11T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31948
published_at 2026-04-12T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31915
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27796
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099954
reference_id 1099954
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099954
3
reference_url https://sourceforge.net/p/graphicsmagick/bugs/750/
reference_id 750
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T19:36:21Z/
url https://sourceforge.net/p/graphicsmagick/bugs/750/
4
reference_url https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/883ebf8cae6dfa5873d975fe3476b1a188ef3f9f
reference_id 883ebf8cae6dfa5873d975fe3476b1a188ef3f9f
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T19:36:21Z/
url https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/883ebf8cae6dfa5873d975fe3476b1a188ef3f9f
5
reference_url http://www.graphicsmagick.org/NEWS.html
reference_id NEWS.html
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T19:36:21Z/
url http://www.graphicsmagick.org/NEWS.html
6
reference_url https://usn.ubuntu.com/7433-1/
reference_id USN-7433-1
reference_type
scores
url https://usn.ubuntu.com/7433-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@0?distro=trixie
purl pkg:deb/debian/graphicsmagick@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@0%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17689-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17689-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17689-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
5
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2025-27796
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r2pq-4trw-13ab
101
url VCID-refp-fu5m-n7at
vulnerability_id VCID-refp-fu5m-n7at
summary The Magick_png_malloc function in coders/png.c in GraphicsMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3438
reference_id
reference_type
scores
0
value 0.01138
scoring_system epss
scoring_elements 0.7834
published_at 2026-04-01T12:55:00Z
1
value 0.01138
scoring_system epss
scoring_elements 0.78346
published_at 2026-04-02T12:55:00Z
2
value 0.01138
scoring_system epss
scoring_elements 0.78377
published_at 2026-04-04T12:55:00Z
3
value 0.01138
scoring_system epss
scoring_elements 0.78361
published_at 2026-04-07T12:55:00Z
4
value 0.01138
scoring_system epss
scoring_elements 0.78387
published_at 2026-04-08T12:55:00Z
5
value 0.01138
scoring_system epss
scoring_elements 0.78393
published_at 2026-04-09T12:55:00Z
6
value 0.01138
scoring_system epss
scoring_elements 0.78419
published_at 2026-04-11T12:55:00Z
7
value 0.01138
scoring_system epss
scoring_elements 0.78402
published_at 2026-04-12T12:55:00Z
8
value 0.01138
scoring_system epss
scoring_elements 0.78394
published_at 2026-04-13T12:55:00Z
9
value 0.01138
scoring_system epss
scoring_elements 0.78423
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3438
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3438
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683284
reference_id 683284
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683284
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.16-1.1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.16-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.16-1.1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2012-3438
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-refp-fu5m-n7at
102
url VCID-rh12-2196-ekcm
vulnerability_id VCID-rh12-2196-ekcm
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18220.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18220.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18220
reference_id
reference_type
scores
0
value 0.02714
scoring_system epss
scoring_elements 0.85852
published_at 2026-04-01T12:55:00Z
1
value 0.02714
scoring_system epss
scoring_elements 0.85864
published_at 2026-04-02T12:55:00Z
2
value 0.02714
scoring_system epss
scoring_elements 0.85881
published_at 2026-04-04T12:55:00Z
3
value 0.02714
scoring_system epss
scoring_elements 0.85885
published_at 2026-04-07T12:55:00Z
4
value 0.02714
scoring_system epss
scoring_elements 0.85903
published_at 2026-04-08T12:55:00Z
5
value 0.02714
scoring_system epss
scoring_elements 0.85914
published_at 2026-04-09T12:55:00Z
6
value 0.02714
scoring_system epss
scoring_elements 0.85928
published_at 2026-04-11T12:55:00Z
7
value 0.02714
scoring_system epss
scoring_elements 0.85925
published_at 2026-04-12T12:55:00Z
8
value 0.02714
scoring_system epss
scoring_elements 0.8592
published_at 2026-04-13T12:55:00Z
9
value 0.02714
scoring_system epss
scoring_elements 0.85938
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18220
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1554194
reference_id 1554194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1554194
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-8?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-8%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-18220
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rh12-2196-ekcm
103
url VCID-rj8k-p2xg-6fcs
vulnerability_id VCID-rj8k-p2xg-6fcs
summary Heap-based buffer overflow in the EscapeParenthesis function in GraphicsMagick before 1.3.25 allows remote attackers to have unspecified impact via unknown vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7447
reference_id
reference_type
scores
0
value 0.02021
scoring_system epss
scoring_elements 0.83795
published_at 2026-04-16T12:55:00Z
1
value 0.02021
scoring_system epss
scoring_elements 0.83695
published_at 2026-04-01T12:55:00Z
2
value 0.02021
scoring_system epss
scoring_elements 0.83708
published_at 2026-04-02T12:55:00Z
3
value 0.02021
scoring_system epss
scoring_elements 0.83723
published_at 2026-04-04T12:55:00Z
4
value 0.02021
scoring_system epss
scoring_elements 0.83726
published_at 2026-04-07T12:55:00Z
5
value 0.02021
scoring_system epss
scoring_elements 0.83749
published_at 2026-04-08T12:55:00Z
6
value 0.02021
scoring_system epss
scoring_elements 0.83756
published_at 2026-04-09T12:55:00Z
7
value 0.02021
scoring_system epss
scoring_elements 0.83772
published_at 2026-04-11T12:55:00Z
8
value 0.02021
scoring_system epss
scoring_elements 0.83765
published_at 2026-04-12T12:55:00Z
9
value 0.02021
scoring_system epss
scoring_elements 0.83761
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7447
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7447
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.25-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.25-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-7447
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rj8k-p2xg-6fcs
104
url VCID-rkkf-72ks-dqdk
vulnerability_id VCID-rkkf-72ks-dqdk
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10799
reference_id
reference_type
scores
0
value 0.00372
scoring_system epss
scoring_elements 0.58996
published_at 2026-04-16T12:55:00Z
1
value 0.00372
scoring_system epss
scoring_elements 0.58962
published_at 2026-04-13T12:55:00Z
2
value 0.00372
scoring_system epss
scoring_elements 0.58859
published_at 2026-04-01T12:55:00Z
3
value 0.00372
scoring_system epss
scoring_elements 0.58934
published_at 2026-04-02T12:55:00Z
4
value 0.00372
scoring_system epss
scoring_elements 0.58956
published_at 2026-04-04T12:55:00Z
5
value 0.00372
scoring_system epss
scoring_elements 0.58922
published_at 2026-04-07T12:55:00Z
6
value 0.00372
scoring_system epss
scoring_elements 0.58974
published_at 2026-04-08T12:55:00Z
7
value 0.00372
scoring_system epss
scoring_elements 0.5898
published_at 2026-04-09T12:55:00Z
8
value 0.00372
scoring_system epss
scoring_elements 0.58999
published_at 2026-04-11T12:55:00Z
9
value 0.00372
scoring_system epss
scoring_elements 0.58981
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10799
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867077
reference_id 867077
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867077
59
reference_url https://usn.ubuntu.com/4206-1/
reference_id USN-4206-1
reference_type
scores
url https://usn.ubuntu.com/4206-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-10799
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rkkf-72ks-dqdk
105
url VCID-rv4b-qhdr-k7ex
vulnerability_id VCID-rv4b-qhdr-k7ex
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11722
reference_id
reference_type
scores
0
value 0.00733
scoring_system epss
scoring_elements 0.72663
published_at 2026-04-01T12:55:00Z
1
value 0.00733
scoring_system epss
scoring_elements 0.72671
published_at 2026-04-02T12:55:00Z
2
value 0.00733
scoring_system epss
scoring_elements 0.72689
published_at 2026-04-04T12:55:00Z
3
value 0.00733
scoring_system epss
scoring_elements 0.72666
published_at 2026-04-07T12:55:00Z
4
value 0.00733
scoring_system epss
scoring_elements 0.72705
published_at 2026-04-08T12:55:00Z
5
value 0.00733
scoring_system epss
scoring_elements 0.72719
published_at 2026-04-09T12:55:00Z
6
value 0.00733
scoring_system epss
scoring_elements 0.72742
published_at 2026-04-11T12:55:00Z
7
value 0.00733
scoring_system epss
scoring_elements 0.72725
published_at 2026-04-12T12:55:00Z
8
value 0.00733
scoring_system epss
scoring_elements 0.72715
published_at 2026-04-13T12:55:00Z
9
value 0.00733
scoring_system epss
scoring_elements 0.72758
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11722
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870158
reference_id 870158
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870158
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-4?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-4%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-11722
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rv4b-qhdr-k7ex
106
url VCID-rzzk-7g6m-3yfp
vulnerability_id VCID-rzzk-7g6m-3yfp
summary ImageMagick: use of uninitialized memory in RLE decoder
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9098.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9098.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9098
reference_id
reference_type
scores
0
value 0.0146
scoring_system epss
scoring_elements 0.80782
published_at 2026-04-01T12:55:00Z
1
value 0.0146
scoring_system epss
scoring_elements 0.80876
published_at 2026-04-16T12:55:00Z
2
value 0.0146
scoring_system epss
scoring_elements 0.80861
published_at 2026-04-11T12:55:00Z
3
value 0.0146
scoring_system epss
scoring_elements 0.80846
published_at 2026-04-12T12:55:00Z
4
value 0.0146
scoring_system epss
scoring_elements 0.80839
published_at 2026-04-13T12:55:00Z
5
value 0.0146
scoring_system epss
scoring_elements 0.80791
published_at 2026-04-02T12:55:00Z
6
value 0.0146
scoring_system epss
scoring_elements 0.80812
published_at 2026-04-04T12:55:00Z
7
value 0.0146
scoring_system epss
scoring_elements 0.80809
published_at 2026-04-07T12:55:00Z
8
value 0.0146
scoring_system epss
scoring_elements 0.80836
published_at 2026-04-08T12:55:00Z
9
value 0.0146
scoring_system epss
scoring_elements 0.80845
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9098
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7606
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7941
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7943
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8344
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8345
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8346
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8347
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8348
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8349
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8350
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8351
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8352
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8353
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8354
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8355
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8356
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8357
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8765
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8830
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9098
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9141
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9142
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9142
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9143
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9144
28
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1453124
reference_id 1453124
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1453124
30
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862967
reference_id 862967
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862967
31
reference_url https://security.archlinux.org/AVG-939
reference_id AVG-939
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-939
32
reference_url https://usn.ubuntu.com/3302-1/
reference_id USN-3302-1
reference_type
scores
url https://usn.ubuntu.com/3302-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.24-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-9098
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzzk-7g6m-3yfp
107
url VCID-s1qp-wtc6-2yg3
vulnerability_id VCID-s1qp-wtc6-2yg3
summary security update
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=5381c71724e3
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=5381c71724e3
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14733
reference_id
reference_type
scores
0
value 0.00764
scoring_system epss
scoring_elements 0.73428
published_at 2026-04-13T12:55:00Z
1
value 0.00764
scoring_system epss
scoring_elements 0.73436
published_at 2026-04-12T12:55:00Z
2
value 0.00764
scoring_system epss
scoring_elements 0.73456
published_at 2026-04-11T12:55:00Z
3
value 0.00764
scoring_system epss
scoring_elements 0.73471
published_at 2026-04-16T12:55:00Z
4
value 0.01424
scoring_system epss
scoring_elements 0.80605
published_at 2026-04-08T12:55:00Z
5
value 0.01424
scoring_system epss
scoring_elements 0.80614
published_at 2026-04-09T12:55:00Z
6
value 0.01424
scoring_system epss
scoring_elements 0.80577
published_at 2026-04-07T12:55:00Z
7
value 0.01424
scoring_system epss
scoring_elements 0.80563
published_at 2026-04-02T12:55:00Z
8
value 0.01424
scoring_system epss
scoring_elements 0.80585
published_at 2026-04-04T12:55:00Z
9
value 0.01424
scoring_system epss
scoring_elements 0.80556
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14733
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
60
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
62
reference_url https://sourceforge.net/p/graphicsmagick/bugs/458/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/458/
63
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14733
reference_id CVE-2017-14733
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-14733
68
reference_url https://usn.ubuntu.com/4232-1/
reference_id USN-4232-1
reference_type
scores
url https://usn.ubuntu.com/4232-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-13?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-13?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-13%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-14733
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s1qp-wtc6-2yg3
108
url VCID-s3a1-5mc6-rkd9
vulnerability_id VCID-s3a1-5mc6-rkd9
summary The ReadSUNImage function in coders/sun.c in GraphicsMagick 1.3.26 has an issue where memory allocation is excessive because it depends only on a length field in a header. This may lead to remote denial of service in the MagickMalloc function in magick/memory.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14165
reference_id
reference_type
scores
0
value 0.00642
scoring_system epss
scoring_elements 0.70658
published_at 2026-04-16T12:55:00Z
1
value 0.00642
scoring_system epss
scoring_elements 0.70627
published_at 2026-04-12T12:55:00Z
2
value 0.00642
scoring_system epss
scoring_elements 0.70613
published_at 2026-04-13T12:55:00Z
3
value 0.00642
scoring_system epss
scoring_elements 0.7055
published_at 2026-04-01T12:55:00Z
4
value 0.00642
scoring_system epss
scoring_elements 0.70564
published_at 2026-04-02T12:55:00Z
5
value 0.00642
scoring_system epss
scoring_elements 0.70581
published_at 2026-04-04T12:55:00Z
6
value 0.00642
scoring_system epss
scoring_elements 0.70558
published_at 2026-04-07T12:55:00Z
7
value 0.00642
scoring_system epss
scoring_elements 0.70604
published_at 2026-04-08T12:55:00Z
8
value 0.00642
scoring_system epss
scoring_elements 0.70619
published_at 2026-04-09T12:55:00Z
9
value 0.00642
scoring_system epss
scoring_elements 0.70642
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14165
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14165
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874724
reference_id 874724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874724
4
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
5
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
6
reference_url https://usn.ubuntu.com/4232-1/
reference_id USN-4232-1
reference_type
scores
url https://usn.ubuntu.com/4232-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-9?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-9%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-14165
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3a1-5mc6-rkd9
109
url VCID-sg7b-evpj-9fdd
vulnerability_id VCID-sg7b-evpj-9fdd
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10938
reference_id
reference_type
scores
0
value 0.02898
scoring_system epss
scoring_elements 0.86348
published_at 2026-04-16T12:55:00Z
1
value 0.02898
scoring_system epss
scoring_elements 0.86332
published_at 2026-04-13T12:55:00Z
2
value 0.02898
scoring_system epss
scoring_elements 0.86268
published_at 2026-04-01T12:55:00Z
3
value 0.02898
scoring_system epss
scoring_elements 0.86278
published_at 2026-04-02T12:55:00Z
4
value 0.02898
scoring_system epss
scoring_elements 0.86296
published_at 2026-04-04T12:55:00Z
5
value 0.02898
scoring_system epss
scoring_elements 0.86297
published_at 2026-04-07T12:55:00Z
6
value 0.02898
scoring_system epss
scoring_elements 0.86315
published_at 2026-04-08T12:55:00Z
7
value 0.02898
scoring_system epss
scoring_elements 0.86325
published_at 2026-04-09T12:55:00Z
8
value 0.02898
scoring_system epss
scoring_elements 0.86339
published_at 2026-04-11T12:55:00Z
9
value 0.02898
scoring_system epss
scoring_elements 0.86337
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10938
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12921
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10938
5
reference_url https://lists.debian.org/debian-lts-announce/2020/04/msg00007.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/04/msg00007.html
6
reference_url https://sourceforge.net/p/graphicsmagick/code/ci/5b4dd7c6674140a115ec9424c8d19c6a458fac3e/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/code/ci/5b4dd7c6674140a115ec9424c8d19c6a458fac3e/
7
reference_url https://www.debian.org/security/2020/dsa-4675
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4675
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-10938
reference_id CVE-2020-10938
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-10938
15
reference_url https://usn.ubuntu.com/USN-5190-1/
reference_id USN-USN-5190-1
reference_type
scores
url https://usn.ubuntu.com/USN-5190-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.34-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.34-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.34-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2020-10938
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sg7b-evpj-9fdd
110
url VCID-shfx-dyg4-eqch
vulnerability_id VCID-shfx-dyg4-eqch
summary security update
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=0683f8724200
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=0683f8724200
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14997
reference_id
reference_type
scores
0
value 0.01852
scoring_system epss
scoring_elements 0.83044
published_at 2026-04-16T12:55:00Z
1
value 0.01852
scoring_system epss
scoring_elements 0.8301
published_at 2026-04-12T12:55:00Z
2
value 0.01852
scoring_system epss
scoring_elements 0.83006
published_at 2026-04-13T12:55:00Z
3
value 0.01852
scoring_system epss
scoring_elements 0.82942
published_at 2026-04-01T12:55:00Z
4
value 0.01852
scoring_system epss
scoring_elements 0.82958
published_at 2026-04-02T12:55:00Z
5
value 0.01852
scoring_system epss
scoring_elements 0.82971
published_at 2026-04-04T12:55:00Z
6
value 0.01852
scoring_system epss
scoring_elements 0.82968
published_at 2026-04-07T12:55:00Z
7
value 0.01852
scoring_system epss
scoring_elements 0.82993
published_at 2026-04-08T12:55:00Z
8
value 0.01852
scoring_system epss
scoring_elements 0.83
published_at 2026-04-09T12:55:00Z
9
value 0.01852
scoring_system epss
scoring_elements 0.83016
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14997
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
60
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
62
reference_url https://sourceforge.net/p/graphicsmagick/bugs/511/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/511/
63
reference_url https://sourceforge.net/p/graphicsmagick/code/ci/0683f8724200495059606c03f04e0d589b33ebe8/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/code/ci/0683f8724200495059606c03f04e0d589b33ebe8/
64
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
65
reference_url http://www.securityfocus.com/bid/101183
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101183
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14997
reference_id CVE-2017-14997
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-14997
70
reference_url https://usn.ubuntu.com/4232-1/
reference_id USN-4232-1
reference_type
scores
url https://usn.ubuntu.com/4232-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-13?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-13?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-13%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-14997
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shfx-dyg4-eqch
111
url VCID-tayr-ecpz-hqb2
vulnerability_id VCID-tayr-ecpz-hqb2
summary security update
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/1721f1b7e67a
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/1721f1b7e67a
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17915
reference_id
reference_type
scores
0
value 0.00692
scoring_system epss
scoring_elements 0.71866
published_at 2026-04-16T12:55:00Z
1
value 0.00692
scoring_system epss
scoring_elements 0.71824
published_at 2026-04-13T12:55:00Z
2
value 0.00692
scoring_system epss
scoring_elements 0.71784
published_at 2026-04-07T12:55:00Z
3
value 0.00692
scoring_system epss
scoring_elements 0.71792
published_at 2026-04-02T12:55:00Z
4
value 0.00692
scoring_system epss
scoring_elements 0.7181
published_at 2026-04-04T12:55:00Z
5
value 0.00692
scoring_system epss
scoring_elements 0.71823
published_at 2026-04-08T12:55:00Z
6
value 0.00692
scoring_system epss
scoring_elements 0.71834
published_at 2026-04-09T12:55:00Z
7
value 0.00692
scoring_system epss
scoring_elements 0.71858
published_at 2026-04-11T12:55:00Z
8
value 0.00692
scoring_system epss
scoring_elements 0.71841
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17915
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
59
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
60
reference_url https://sourceforge.net/p/graphicsmagick/bugs/535/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/535/
61
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.27:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17915
reference_id CVE-2017-17915
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17915
67
reference_url https://usn.ubuntu.com/4266-1/
reference_id USN-4266-1
reference_type
scores
url https://usn.ubuntu.com/4266-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-3?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-3%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-17915
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tayr-ecpz-hqb2
112
url VCID-tsnj-a14b-vqht
vulnerability_id VCID-tsnj-a14b-vqht
summary , CVE-2008-6071, CVE-2008-6072, CVE-2008-6621 multiple security issues in ImageMagick
references
0
reference_url http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/dpx.c
reference_id
reference_type
scores
url http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/dpx.c
1
reference_url http://osvdb.org/46258
reference_id
reference_type
scores
url http://osvdb.org/46258
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-6621.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-6621.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-6621
reference_id
reference_type
scores
0
value 0.00722
scoring_system epss
scoring_elements 0.72557
published_at 2026-04-16T12:55:00Z
1
value 0.00722
scoring_system epss
scoring_elements 0.72468
published_at 2026-04-07T12:55:00Z
2
value 0.00722
scoring_system epss
scoring_elements 0.72474
published_at 2026-04-02T12:55:00Z
3
value 0.00722
scoring_system epss
scoring_elements 0.72492
published_at 2026-04-04T12:55:00Z
4
value 0.00722
scoring_system epss
scoring_elements 0.72506
published_at 2026-04-08T12:55:00Z
5
value 0.00722
scoring_system epss
scoring_elements 0.72519
published_at 2026-04-09T12:55:00Z
6
value 0.00722
scoring_system epss
scoring_elements 0.72542
published_at 2026-04-11T12:55:00Z
7
value 0.00722
scoring_system epss
scoring_elements 0.72525
published_at 2026-04-12T12:55:00Z
8
value 0.00722
scoring_system epss
scoring_elements 0.72515
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-6621
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6621
5
reference_url http://secunia.com/advisories/30549
reference_id
reference_type
scores
url http://secunia.com/advisories/30549
6
reference_url http://sourceforge.net/project/shownotes.php?release_id=604837
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=604837
7
reference_url http://www.vupen.com/english/advisories/2008/1767
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1767
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=516295
reference_id 516295
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=516295
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.13:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.14:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.18:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-6621
reference_id CVE-2008-6621
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-6621
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.2.3-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.2.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.2.3-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2008-6621
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsnj-a14b-vqht
113
url VCID-tsrx-5ffb-wqeq
vulnerability_id VCID-tsrx-5ffb-wqeq
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11140
reference_id
reference_type
scores
0
value 0.00557
scoring_system epss
scoring_elements 0.6822
published_at 2026-04-16T12:55:00Z
1
value 0.00557
scoring_system epss
scoring_elements 0.68181
published_at 2026-04-13T12:55:00Z
2
value 0.00557
scoring_system epss
scoring_elements 0.68119
published_at 2026-04-01T12:55:00Z
3
value 0.00557
scoring_system epss
scoring_elements 0.68142
published_at 2026-04-02T12:55:00Z
4
value 0.00557
scoring_system epss
scoring_elements 0.68159
published_at 2026-04-04T12:55:00Z
5
value 0.00557
scoring_system epss
scoring_elements 0.68137
published_at 2026-04-07T12:55:00Z
6
value 0.00557
scoring_system epss
scoring_elements 0.68188
published_at 2026-04-08T12:55:00Z
7
value 0.00557
scoring_system epss
scoring_elements 0.68204
published_at 2026-04-09T12:55:00Z
8
value 0.00557
scoring_system epss
scoring_elements 0.68229
published_at 2026-04-11T12:55:00Z
9
value 0.00557
scoring_system epss
scoring_elements 0.68215
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11140
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://usn.ubuntu.com/4206-1/
reference_id USN-4206-1
reference_type
scores
url https://usn.ubuntu.com/4206-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-3?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-3%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-11140
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsrx-5ffb-wqeq
114
url VCID-u1jw-5g6t-dybd
vulnerability_id VCID-u1jw-5g6t-dybd
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13777
reference_id
reference_type
scores
0
value 0.01071
scoring_system epss
scoring_elements 0.77775
published_at 2026-04-16T12:55:00Z
1
value 0.01071
scoring_system epss
scoring_elements 0.77739
published_at 2026-04-12T12:55:00Z
2
value 0.01071
scoring_system epss
scoring_elements 0.77738
published_at 2026-04-13T12:55:00Z
3
value 0.01071
scoring_system epss
scoring_elements 0.77678
published_at 2026-04-01T12:55:00Z
4
value 0.01071
scoring_system epss
scoring_elements 0.77685
published_at 2026-04-02T12:55:00Z
5
value 0.01071
scoring_system epss
scoring_elements 0.77712
published_at 2026-04-04T12:55:00Z
6
value 0.01071
scoring_system epss
scoring_elements 0.77695
published_at 2026-04-07T12:55:00Z
7
value 0.01071
scoring_system epss
scoring_elements 0.77723
published_at 2026-04-08T12:55:00Z
8
value 0.01071
scoring_system epss
scoring_elements 0.77728
published_at 2026-04-09T12:55:00Z
9
value 0.01071
scoring_system epss
scoring_elements 0.77754
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13777
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
59
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
60
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-8?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-8%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-13777
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u1jw-5g6t-dybd
115
url VCID-ujf2-gfn9-kfdz
vulnerability_id VCID-ujf2-gfn9-kfdz
summary security update
references
0
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/5b8414c0d0c4
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/5b8414c0d0c4
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17501
reference_id
reference_type
scores
0
value 0.02188
scoring_system epss
scoring_elements 0.844
published_at 2026-04-16T12:55:00Z
1
value 0.02188
scoring_system epss
scoring_elements 0.84389
published_at 2026-04-11T12:55:00Z
2
value 0.02188
scoring_system epss
scoring_elements 0.84383
published_at 2026-04-12T12:55:00Z
3
value 0.02188
scoring_system epss
scoring_elements 0.84379
published_at 2026-04-13T12:55:00Z
4
value 0.02188
scoring_system epss
scoring_elements 0.84307
published_at 2026-04-01T12:55:00Z
5
value 0.02188
scoring_system epss
scoring_elements 0.84321
published_at 2026-04-02T12:55:00Z
6
value 0.02188
scoring_system epss
scoring_elements 0.84342
published_at 2026-04-04T12:55:00Z
7
value 0.02188
scoring_system epss
scoring_elements 0.84345
published_at 2026-04-07T12:55:00Z
8
value 0.02188
scoring_system epss
scoring_elements 0.84366
published_at 2026-04-08T12:55:00Z
9
value 0.02188
scoring_system epss
scoring_elements 0.84372
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17501
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
60
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
62
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
63
reference_url https://sourceforge.net/p/graphicsmagick/bugs/526/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/526/
64
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
65
reference_url http://www.securityfocus.com/bid/102185
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102185
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17501
reference_id CVE-2017-17501
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17501
71
reference_url https://usn.ubuntu.com/4248-1/
reference_id USN-4248-1
reference_type
scores
url https://usn.ubuntu.com/4248-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-17501
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ujf2-gfn9-kfdz
116
url VCID-uvjy-tccq-bkhb
vulnerability_id VCID-uvjy-tccq-bkhb
summary Multiple vulnerabilities have been discovered in GraphicsMagick, the worst of which are fuzzing issues presumed to allow for arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12672
reference_id
reference_type
scores
0
value 0.02691
scoring_system epss
scoring_elements 0.85793
published_at 2026-04-01T12:55:00Z
1
value 0.02691
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-02T12:55:00Z
2
value 0.02691
scoring_system epss
scoring_elements 0.85823
published_at 2026-04-04T12:55:00Z
3
value 0.02691
scoring_system epss
scoring_elements 0.85827
published_at 2026-04-07T12:55:00Z
4
value 0.02691
scoring_system epss
scoring_elements 0.85846
published_at 2026-04-08T12:55:00Z
5
value 0.02691
scoring_system epss
scoring_elements 0.85856
published_at 2026-04-09T12:55:00Z
6
value 0.02691
scoring_system epss
scoring_elements 0.85871
published_at 2026-04-11T12:55:00Z
7
value 0.02691
scoring_system epss
scoring_elements 0.85868
published_at 2026-04-12T12:55:00Z
8
value 0.02691
scoring_system epss
scoring_elements 0.85864
published_at 2026-04-13T12:55:00Z
9
value 0.02691
scoring_system epss
scoring_elements 0.85882
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12672
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12672
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960000
reference_id 960000
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960000
3
reference_url https://security.gentoo.org/glsa/202209-19
reference_id GLSA-202209-19
reference_type
scores
url https://security.gentoo.org/glsa/202209-19
4
reference_url https://usn.ubuntu.com/5974-1/
reference_id USN-5974-1
reference_type
scores
url https://usn.ubuntu.com/5974-1/
5
reference_url https://usn.ubuntu.com/USN-5190-1/
reference_id USN-USN-5190-1
reference_type
scores
url https://usn.ubuntu.com/USN-5190-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-2%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2020-12672
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uvjy-tccq-bkhb
117
url VCID-uwfv-j2mx-63gh
vulnerability_id VCID-uwfv-j2mx-63gh
summary ImageMagick: Heap out-of-bounds read in tiff.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6335.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6335.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6335
reference_id
reference_type
scores
0
value 0.00496
scoring_system epss
scoring_elements 0.65724
published_at 2026-04-01T12:55:00Z
1
value 0.00496
scoring_system epss
scoring_elements 0.65773
published_at 2026-04-02T12:55:00Z
2
value 0.00496
scoring_system epss
scoring_elements 0.65803
published_at 2026-04-04T12:55:00Z
3
value 0.00496
scoring_system epss
scoring_elements 0.65768
published_at 2026-04-07T12:55:00Z
4
value 0.00496
scoring_system epss
scoring_elements 0.65821
published_at 2026-04-08T12:55:00Z
5
value 0.00496
scoring_system epss
scoring_elements 0.65832
published_at 2026-04-09T12:55:00Z
6
value 0.00496
scoring_system epss
scoring_elements 0.65852
published_at 2026-04-11T12:55:00Z
7
value 0.00496
scoring_system epss
scoring_elements 0.65838
published_at 2026-04-12T12:55:00Z
8
value 0.00496
scoring_system epss
scoring_elements 0.65808
published_at 2026-04-13T12:55:00Z
9
value 0.00496
scoring_system epss
scoring_elements 0.65841
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6335
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6335
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1427975
reference_id 1427975
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1427975
5
reference_url https://usn.ubuntu.com/4206-1/
reference_id USN-4206-1
reference_type
scores
url https://usn.ubuntu.com/4206-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.25-8?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.25-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.25-8%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-6335
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uwfv-j2mx-63gh
118
url VCID-uzcy-jrvp-suha
vulnerability_id VCID-uzcy-jrvp-suha
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13775
reference_id
reference_type
scores
0
value 0.0215
scoring_system epss
scoring_elements 0.84265
published_at 2026-04-16T12:55:00Z
1
value 0.0215
scoring_system epss
scoring_elements 0.84244
published_at 2026-04-13T12:55:00Z
2
value 0.0215
scoring_system epss
scoring_elements 0.84173
published_at 2026-04-01T12:55:00Z
3
value 0.0215
scoring_system epss
scoring_elements 0.84187
published_at 2026-04-02T12:55:00Z
4
value 0.0215
scoring_system epss
scoring_elements 0.84205
published_at 2026-04-04T12:55:00Z
5
value 0.0215
scoring_system epss
scoring_elements 0.84206
published_at 2026-04-07T12:55:00Z
6
value 0.0215
scoring_system epss
scoring_elements 0.84227
published_at 2026-04-08T12:55:00Z
7
value 0.0215
scoring_system epss
scoring_elements 0.84234
published_at 2026-04-09T12:55:00Z
8
value 0.0215
scoring_system epss
scoring_elements 0.84252
published_at 2026-04-11T12:55:00Z
9
value 0.0215
scoring_system epss
scoring_elements 0.84247
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13775
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-8?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-8%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-13775
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uzcy-jrvp-suha
119
url VCID-v4yk-f1rh-efh3
vulnerability_id VCID-v4yk-f1rh-efh3
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19950
reference_id
reference_type
scores
0
value 0.01204
scoring_system epss
scoring_elements 0.78891
published_at 2026-04-01T12:55:00Z
1
value 0.01204
scoring_system epss
scoring_elements 0.78897
published_at 2026-04-02T12:55:00Z
2
value 0.01204
scoring_system epss
scoring_elements 0.78926
published_at 2026-04-04T12:55:00Z
3
value 0.01204
scoring_system epss
scoring_elements 0.78909
published_at 2026-04-07T12:55:00Z
4
value 0.01204
scoring_system epss
scoring_elements 0.78933
published_at 2026-04-08T12:55:00Z
5
value 0.01204
scoring_system epss
scoring_elements 0.78939
published_at 2026-04-09T12:55:00Z
6
value 0.01204
scoring_system epss
scoring_elements 0.78963
published_at 2026-04-11T12:55:00Z
7
value 0.01204
scoring_system epss
scoring_elements 0.78948
published_at 2026-04-12T12:55:00Z
8
value 0.01204
scoring_system epss
scoring_elements 0.78938
published_at 2026-04-13T12:55:00Z
9
value 0.01204
scoring_system epss
scoring_elements 0.78967
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19950
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19950
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953
4
reference_url https://usn.ubuntu.com/USN-5190-1/
reference_id USN-USN-5190-1
reference_type
scores
url https://usn.ubuntu.com/USN-5190-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg16039-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg16039-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg16039-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-19950
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v4yk-f1rh-efh3
120
url VCID-vfmq-6c3d-tuf2
vulnerability_id VCID-vfmq-6c3d-tuf2
summary security update
references
0
reference_url http://hg.code.sf.net/p/graphicsmagick/code/rev/785758bbbfcc
reference_id
reference_type
scores
url http://hg.code.sf.net/p/graphicsmagick/code/rev/785758bbbfcc
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16547
reference_id
reference_type
scores
0
value 0.00859
scoring_system epss
scoring_elements 0.75043
published_at 2026-04-16T12:55:00Z
1
value 0.00859
scoring_system epss
scoring_elements 0.75018
published_at 2026-04-12T12:55:00Z
2
value 0.00859
scoring_system epss
scoring_elements 0.75039
published_at 2026-04-11T12:55:00Z
3
value 0.00859
scoring_system epss
scoring_elements 0.75007
published_at 2026-04-13T12:55:00Z
4
value 0.00859
scoring_system epss
scoring_elements 0.74964
published_at 2026-04-01T12:55:00Z
5
value 0.00859
scoring_system epss
scoring_elements 0.74967
published_at 2026-04-02T12:55:00Z
6
value 0.00859
scoring_system epss
scoring_elements 0.74996
published_at 2026-04-04T12:55:00Z
7
value 0.00859
scoring_system epss
scoring_elements 0.74972
published_at 2026-04-07T12:55:00Z
8
value 0.00859
scoring_system epss
scoring_elements 0.75006
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16547
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00016.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00016.html
60
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
62
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
63
reference_url https://sourceforge.net/p/graphicsmagick/bugs/517/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/517/
64
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
65
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
66
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16547
reference_id CVE-2017-16547
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16547
69
reference_url https://usn.ubuntu.com/4248-1/
reference_id USN-4248-1
reference_type
scores
url https://usn.ubuntu.com/4248-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-18?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-18?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-18%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-16547
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vfmq-6c3d-tuf2
121
url VCID-vgcw-qt88-1ybz
vulnerability_id VCID-vgcw-qt88-1ybz
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11102
reference_id
reference_type
scores
0
value 0.02022
scoring_system epss
scoring_elements 0.83798
published_at 2026-04-16T12:55:00Z
1
value 0.02022
scoring_system epss
scoring_elements 0.83764
published_at 2026-04-13T12:55:00Z
2
value 0.02022
scoring_system epss
scoring_elements 0.83698
published_at 2026-04-01T12:55:00Z
3
value 0.02022
scoring_system epss
scoring_elements 0.83711
published_at 2026-04-02T12:55:00Z
4
value 0.02022
scoring_system epss
scoring_elements 0.83726
published_at 2026-04-04T12:55:00Z
5
value 0.02022
scoring_system epss
scoring_elements 0.83729
published_at 2026-04-07T12:55:00Z
6
value 0.02022
scoring_system epss
scoring_elements 0.83752
published_at 2026-04-08T12:55:00Z
7
value 0.02022
scoring_system epss
scoring_elements 0.83758
published_at 2026-04-09T12:55:00Z
8
value 0.02022
scoring_system epss
scoring_elements 0.83775
published_at 2026-04-11T12:55:00Z
9
value 0.02022
scoring_system epss
scoring_elements 0.83769
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11102
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867746
reference_id 867746
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867746
59
reference_url https://usn.ubuntu.com/4206-1/
reference_id USN-4206-1
reference_type
scores
url https://usn.ubuntu.com/4206-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-2%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-11102
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vgcw-qt88-1ybz
122
url VCID-vv56-v3c7-kfa1
vulnerability_id VCID-vv56-v3c7-kfa1
summary
Multiple buffer overflows have been discovered in ImageMagick, which could
    potentially result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3744.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3744.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3744
reference_id
reference_type
scores
0
value 0.02059
scoring_system epss
scoring_elements 0.83838
published_at 2026-04-01T12:55:00Z
1
value 0.02059
scoring_system epss
scoring_elements 0.83852
published_at 2026-04-02T12:55:00Z
2
value 0.02059
scoring_system epss
scoring_elements 0.83867
published_at 2026-04-04T12:55:00Z
3
value 0.02059
scoring_system epss
scoring_elements 0.83869
published_at 2026-04-07T12:55:00Z
4
value 0.02059
scoring_system epss
scoring_elements 0.83893
published_at 2026-04-08T12:55:00Z
5
value 0.02059
scoring_system epss
scoring_elements 0.83899
published_at 2026-04-09T12:55:00Z
6
value 0.02059
scoring_system epss
scoring_elements 0.83916
published_at 2026-04-11T12:55:00Z
7
value 0.02059
scoring_system epss
scoring_elements 0.8391
published_at 2026-04-12T12:55:00Z
8
value 0.02059
scoring_system epss
scoring_elements 0.83906
published_at 2026-04-13T12:55:00Z
9
value 0.02059
scoring_system epss
scoring_elements 0.83932
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3744
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3744
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618159
reference_id 1618159
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618159
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=385062
reference_id 385062
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=385062
5
reference_url https://security.gentoo.org/glsa/200609-14
reference_id GLSA-200609-14
reference_type
scores
url https://security.gentoo.org/glsa/200609-14
6
reference_url https://access.redhat.com/errata/RHSA-2006:0633
reference_id RHSA-2006:0633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0633
7
reference_url https://usn.ubuntu.com/340-1/
reference_id USN-340-1
reference_type
scores
url https://usn.ubuntu.com/340-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.7-7?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.7-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.7-7%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2006-3744
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vv56-v3c7-kfa1
123
url VCID-vvrj-f9uj-1bfy
vulnerability_id VCID-vvrj-f9uj-1bfy
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13063
reference_id
reference_type
scores
0
value 0.0089
scoring_system epss
scoring_elements 0.75559
published_at 2026-04-16T12:55:00Z
1
value 0.01536
scoring_system epss
scoring_elements 0.81309
published_at 2026-04-07T12:55:00Z
2
value 0.01536
scoring_system epss
scoring_elements 0.81364
published_at 2026-04-11T12:55:00Z
3
value 0.01536
scoring_system epss
scoring_elements 0.81349
published_at 2026-04-12T12:55:00Z
4
value 0.01536
scoring_system epss
scoring_elements 0.81341
published_at 2026-04-13T12:55:00Z
5
value 0.01536
scoring_system epss
scoring_elements 0.81288
published_at 2026-04-02T12:55:00Z
6
value 0.01536
scoring_system epss
scoring_elements 0.8131
published_at 2026-04-04T12:55:00Z
7
value 0.01536
scoring_system epss
scoring_elements 0.81279
published_at 2026-04-01T12:55:00Z
8
value 0.01536
scoring_system epss
scoring_elements 0.81338
published_at 2026-04-08T12:55:00Z
9
value 0.01536
scoring_system epss
scoring_elements 0.81343
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13063
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873130
reference_id 873130
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873130
59
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
60
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
61
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-7?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-7%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-13063
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vvrj-f9uj-1bfy
124
url VCID-vw42-dhfh-77av
vulnerability_id VCID-vw42-dhfh-77av
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18219.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18219.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18219
reference_id
reference_type
scores
0
value 0.05966
scoring_system epss
scoring_elements 0.90611
published_at 2026-04-01T12:55:00Z
1
value 0.05966
scoring_system epss
scoring_elements 0.90615
published_at 2026-04-02T12:55:00Z
2
value 0.05966
scoring_system epss
scoring_elements 0.90624
published_at 2026-04-04T12:55:00Z
3
value 0.05966
scoring_system epss
scoring_elements 0.90632
published_at 2026-04-07T12:55:00Z
4
value 0.05966
scoring_system epss
scoring_elements 0.90643
published_at 2026-04-08T12:55:00Z
5
value 0.05966
scoring_system epss
scoring_elements 0.90649
published_at 2026-04-09T12:55:00Z
6
value 0.05966
scoring_system epss
scoring_elements 0.90658
published_at 2026-04-12T12:55:00Z
7
value 0.05966
scoring_system epss
scoring_elements 0.90653
published_at 2026-04-13T12:55:00Z
8
value 0.05966
scoring_system epss
scoring_elements 0.90672
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18219
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
59
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1554187
reference_id 1554187
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1554187
60
reference_url https://usn.ubuntu.com/4266-1/
reference_id USN-4266-1
reference_type
scores
url https://usn.ubuntu.com/4266-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-18219
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vw42-dhfh-77av
125
url VCID-w278-q56x-j7fw
vulnerability_id VCID-w278-q56x-j7fw
summary
Multiple integer overflows have been discovered in ImageMagick allowing for
    the execution of arbitrary code.
references
0
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=496
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1797.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1797.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1797
reference_id
reference_type
scores
0
value 0.15619
scoring_system epss
scoring_elements 0.94707
published_at 2026-04-16T12:55:00Z
1
value 0.15619
scoring_system epss
scoring_elements 0.9466
published_at 2026-04-01T12:55:00Z
2
value 0.15619
scoring_system epss
scoring_elements 0.94667
published_at 2026-04-02T12:55:00Z
3
value 0.15619
scoring_system epss
scoring_elements 0.94672
published_at 2026-04-04T12:55:00Z
4
value 0.15619
scoring_system epss
scoring_elements 0.94674
published_at 2026-04-07T12:55:00Z
5
value 0.15619
scoring_system epss
scoring_elements 0.94684
published_at 2026-04-08T12:55:00Z
6
value 0.15619
scoring_system epss
scoring_elements 0.94689
published_at 2026-04-09T12:55:00Z
7
value 0.15619
scoring_system epss
scoring_elements 0.94693
published_at 2026-04-11T12:55:00Z
8
value 0.15619
scoring_system epss
scoring_elements 0.94696
published_at 2026-04-12T12:55:00Z
9
value 0.15619
scoring_system epss
scoring_elements 0.94697
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1797
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797
4
reference_url http://secunia.com/advisories/24721
reference_id
reference_type
scores
url http://secunia.com/advisories/24721
5
reference_url http://secunia.com/advisories/24739
reference_id
reference_type
scores
url http://secunia.com/advisories/24739
6
reference_url http://secunia.com/advisories/25072
reference_id
reference_type
scores
url http://secunia.com/advisories/25072
7
reference_url http://secunia.com/advisories/25206
reference_id
reference_type
scores
url http://secunia.com/advisories/25206
8
reference_url http://secunia.com/advisories/25992
reference_id
reference_type
scores
url http://secunia.com/advisories/25992
9
reference_url http://secunia.com/advisories/26177
reference_id
reference_type
scores
url http://secunia.com/advisories/26177
10
reference_url http://secunia.com/advisories/29786
reference_id
reference_type
scores
url http://secunia.com/advisories/29786
11
reference_url http://secunia.com/advisories/29857
reference_id
reference_type
scores
url http://secunia.com/advisories/29857
12
reference_url http://secunia.com/advisories/36260
reference_id
reference_type
scores
url http://secunia.com/advisories/36260
13
reference_url http://security.gentoo.org/glsa/glsa-200705-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-13.xml
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33376
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33376
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33377
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33377
16
reference_url https://issues.foresightlinux.org/browse/FL-222
reference_id
reference_type
scores
url https://issues.foresightlinux.org/browse/FL-222
17
reference_url https://issues.rpath.com/browse/RPL-1205
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1205
18
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9254
19
reference_url http://www.debian.org/security/2009/dsa-1858
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1858
20
reference_url http://www.imagemagick.org/script/changelog.php
reference_id
reference_type
scores
url http://www.imagemagick.org/script/changelog.php
21
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:147
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:147
22
reference_url http://www.novell.com/linux/security/advisories/2007_8_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_8_sr.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2008-0145.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0145.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2008-0165.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0165.html
25
reference_url http://www.securityfocus.com/bid/23252
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23252
26
reference_url http://www.securityfocus.com/bid/23347
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23347
27
reference_url http://www.securitytracker.com/id?1017839
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017839
28
reference_url http://www.ubuntu.com/usn/usn-481-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-481-1
29
reference_url http://www.vupen.com/english/advisories/2007/1200
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1200
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=235071
reference_id 235071
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=235071
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.0.8:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.2.:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.2.:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.2.:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2.8:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3.4:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1797
reference_id CVE-2007-1797
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-1797
62
reference_url https://security.gentoo.org/glsa/200705-13
reference_id GLSA-200705-13
reference_type
scores
url https://security.gentoo.org/glsa/200705-13
63
reference_url https://access.redhat.com/errata/RHSA-2008:0145
reference_id RHSA-2008:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0145
64
reference_url https://access.redhat.com/errata/RHSA-2008:0165
reference_id RHSA-2008:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0165
65
reference_url https://usn.ubuntu.com/481-1/
reference_id USN-481-1
reference_type
scores
url https://usn.ubuntu.com/481-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.7-15?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.7-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.7-15%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2007-1797
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w278-q56x-j7fw
126
url VCID-w715-2a79-8khq
vulnerability_id VCID-w715-2a79-8khq
summary GraphicsMagick/ImageMagick: multiple crash or DoS issues
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3134.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3134.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3134
reference_id
reference_type
scores
0
value 0.01621
scoring_system epss
scoring_elements 0.8187
published_at 2026-04-16T12:55:00Z
1
value 0.01621
scoring_system epss
scoring_elements 0.81768
published_at 2026-04-01T12:55:00Z
2
value 0.01621
scoring_system epss
scoring_elements 0.81778
published_at 2026-04-02T12:55:00Z
3
value 0.01621
scoring_system epss
scoring_elements 0.81801
published_at 2026-04-04T12:55:00Z
4
value 0.01621
scoring_system epss
scoring_elements 0.81799
published_at 2026-04-07T12:55:00Z
5
value 0.01621
scoring_system epss
scoring_elements 0.81826
published_at 2026-04-08T12:55:00Z
6
value 0.01621
scoring_system epss
scoring_elements 0.81832
published_at 2026-04-09T12:55:00Z
7
value 0.01621
scoring_system epss
scoring_elements 0.81851
published_at 2026-04-11T12:55:00Z
8
value 0.01621
scoring_system epss
scoring_elements 0.81839
published_at 2026-04-12T12:55:00Z
9
value 0.01621
scoring_system epss
scoring_elements 0.81833
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3134
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3134
4
reference_url http://secunia.com/advisories/30879
reference_id
reference_type
scores
url http://secunia.com/advisories/30879
5
reference_url http://secunia.com/advisories/32151
reference_id
reference_type
scores
url http://secunia.com/advisories/32151
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
8
reference_url http://sourceforge.net/forum/forum.php?forum_id=841176
reference_id
reference_type
scores
url http://sourceforge.net/forum/forum.php?forum_id=841176
9
reference_url http://sourceforge.net/project/shownotes.php?release_id=610253
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=610253
10
reference_url http://www.securityfocus.com/bid/30055
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30055
11
reference_url http://www.securitytracker.com/id?1020413
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020413
12
reference_url http://www.vupen.com/english/advisories/2008/1984/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1984/references
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=454982
reference_id 454982
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=454982
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=491439
reference_id 491439
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=491439
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559775
reference_id 559775
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559775
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.18:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3134
reference_id CVE-2008-3134
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3134
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.2.4-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.2.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.2.4-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2008-3134
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w715-2a79-8khq
127
url VCID-wj7h-ers5-qfat
vulnerability_id VCID-wj7h-ers5-qfat
summary security update
references
0
reference_url ftp://ftp.graphicsmagick.org/pub/GraphicsMagick/snapshots/ChangeLog.txt
reference_id
reference_type
scores
url ftp://ftp.graphicsmagick.org/pub/GraphicsMagick/snapshots/ChangeLog.txt
1
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=e4e1c2a581d8
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=e4e1c2a581d8
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16353.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16353.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16353
reference_id
reference_type
scores
0
value 0.32261
scoring_system epss
scoring_elements 0.96808
published_at 2026-04-01T12:55:00Z
1
value 0.32261
scoring_system epss
scoring_elements 0.96841
published_at 2026-04-16T12:55:00Z
2
value 0.32261
scoring_system epss
scoring_elements 0.96829
published_at 2026-04-08T12:55:00Z
3
value 0.32261
scoring_system epss
scoring_elements 0.96831
published_at 2026-04-09T12:55:00Z
4
value 0.32261
scoring_system epss
scoring_elements 0.96833
published_at 2026-04-12T12:55:00Z
5
value 0.32261
scoring_system epss
scoring_elements 0.96834
published_at 2026-04-13T12:55:00Z
6
value 0.32261
scoring_system epss
scoring_elements 0.96816
published_at 2026-04-02T12:55:00Z
7
value 0.32261
scoring_system epss
scoring_elements 0.96817
published_at 2026-04-04T12:55:00Z
8
value 0.32261
scoring_system epss
scoring_elements 0.96821
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16353
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
60
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
61
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00002.html
62
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
63
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
64
reference_url https://www.exploit-db.com/exploits/43111/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/43111/
65
reference_url http://www.securityfocus.com/bid/101653
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101653
66
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1512047
reference_id 1512047
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1512047
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16353
reference_id CVE-2017-16353
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-16353
72
reference_url https://usn.ubuntu.com/4232-1/
reference_id USN-4232-1
reference_type
scores
url https://usn.ubuntu.com/4232-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-17?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-17?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-17%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-16353
risk_score 10.0
exploitability 2.0
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wj7h-ers5-qfat
128
url VCID-wk4h-a1su-wfbh
vulnerability_id VCID-wk4h-a1su-wfbh
summary
Multiple vulnerabilities have been found in ImageMagick, the worst
    of which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
reference_id
reference_type
scores
url http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0726.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0726.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3716.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3716.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3716
reference_id
reference_type
scores
0
value 0.24302
scoring_system epss
scoring_elements 0.96103
published_at 2026-04-16T12:55:00Z
1
value 0.24302
scoring_system epss
scoring_elements 0.96094
published_at 2026-04-13T12:55:00Z
2
value 0.24302
scoring_system epss
scoring_elements 0.96057
published_at 2026-04-01T12:55:00Z
3
value 0.24302
scoring_system epss
scoring_elements 0.96064
published_at 2026-04-02T12:55:00Z
4
value 0.24302
scoring_system epss
scoring_elements 0.9607
published_at 2026-04-04T12:55:00Z
5
value 0.24302
scoring_system epss
scoring_elements 0.96076
published_at 2026-04-07T12:55:00Z
6
value 0.24302
scoring_system epss
scoring_elements 0.96085
published_at 2026-04-08T12:55:00Z
7
value 0.24302
scoring_system epss
scoring_elements 0.96088
published_at 2026-04-09T12:55:00Z
8
value 0.24302
scoring_system epss
scoring_elements 0.96091
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3716
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239
14
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
15
reference_url https://www.exploit-db.com/exploits/39767/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/39767/
16
reference_url https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
reference_id
reference_type
scores
url https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
17
reference_url https://www.imagemagick.org/script/changelog.php
reference_id
reference_type
scores
url https://www.imagemagick.org/script/changelog.php
18
reference_url http://www.debian.org/security/2016/dsa-3580
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3580
19
reference_url http://www.openwall.com/lists/oss-security/2016/05/03/18
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/03/18
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
21
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
22
reference_url http://www.securityfocus.com/archive/1/538378/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/538378/100/0/threaded
23
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
24
reference_url http://www.ubuntu.com/usn/USN-2990-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2990-1
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1332504
reference_id 1332504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1332504
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3716
reference_id CVE-2016-3716
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-3716
46
reference_url https://security.gentoo.org/glsa/201611-21
reference_id GLSA-201611-21
reference_type
scores
url https://security.gentoo.org/glsa/201611-21
47
reference_url https://access.redhat.com/errata/RHSA-2016:0726
reference_id RHSA-2016:0726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0726
48
reference_url https://usn.ubuntu.com/2990-1/
reference_id USN-2990-1
reference_type
scores
url https://usn.ubuntu.com/2990-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.24-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.24-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2016-3716
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wk4h-a1su-wfbh
129
url VCID-wqrx-mq2z-7qfu
vulnerability_id VCID-wqrx-mq2z-7qfu
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13064
reference_id
reference_type
scores
0
value 0.00985
scoring_system epss
scoring_elements 0.76866
published_at 2026-04-16T12:55:00Z
1
value 0.017
scoring_system epss
scoring_elements 0.82251
published_at 2026-04-07T12:55:00Z
2
value 0.017
scoring_system epss
scoring_elements 0.82305
published_at 2026-04-11T12:55:00Z
3
value 0.017
scoring_system epss
scoring_elements 0.82299
published_at 2026-04-12T12:55:00Z
4
value 0.017
scoring_system epss
scoring_elements 0.82293
published_at 2026-04-13T12:55:00Z
5
value 0.017
scoring_system epss
scoring_elements 0.82236
published_at 2026-04-02T12:55:00Z
6
value 0.017
scoring_system epss
scoring_elements 0.82256
published_at 2026-04-04T12:55:00Z
7
value 0.017
scoring_system epss
scoring_elements 0.82223
published_at 2026-04-01T12:55:00Z
8
value 0.017
scoring_system epss
scoring_elements 0.82278
published_at 2026-04-08T12:55:00Z
9
value 0.017
scoring_system epss
scoring_elements 0.82286
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13064
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873129
reference_id 873129
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873129
59
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
60
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
61
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-7?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-7%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-13064
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqrx-mq2z-7qfu
130
url VCID-wv7z-1hnd-suef
vulnerability_id VCID-wv7z-1hnd-suef
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11403
reference_id
reference_type
scores
0
value 0.00963
scoring_system epss
scoring_elements 0.76559
published_at 2026-04-16T12:55:00Z
1
value 0.00963
scoring_system epss
scoring_elements 0.76523
published_at 2026-04-12T12:55:00Z
2
value 0.00963
scoring_system epss
scoring_elements 0.76518
published_at 2026-04-13T12:55:00Z
3
value 0.00963
scoring_system epss
scoring_elements 0.76459
published_at 2026-04-01T12:55:00Z
4
value 0.00963
scoring_system epss
scoring_elements 0.76464
published_at 2026-04-02T12:55:00Z
5
value 0.00963
scoring_system epss
scoring_elements 0.76492
published_at 2026-04-04T12:55:00Z
6
value 0.00963
scoring_system epss
scoring_elements 0.76475
published_at 2026-04-07T12:55:00Z
7
value 0.00963
scoring_system epss
scoring_elements 0.76507
published_at 2026-04-08T12:55:00Z
8
value 0.00963
scoring_system epss
scoring_elements 0.76519
published_at 2026-04-09T12:55:00Z
9
value 0.00963
scoring_system epss
scoring_elements 0.76544
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11403
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://security.archlinux.org/ASA-201801-7
reference_id ASA-201801-7
reference_type
scores
url https://security.archlinux.org/ASA-201801-7
59
reference_url https://security.archlinux.org/AVG-355
reference_id AVG-355
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-355
60
reference_url https://usn.ubuntu.com/4206-1/
reference_id USN-4206-1
reference_type
scores
url https://usn.ubuntu.com/4206-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-3?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-3%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-11403
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wv7z-1hnd-suef
131
url VCID-wwqv-tpq5-dqgs
vulnerability_id VCID-wwqv-tpq5-dqgs
summary coders/xwd.c in GraphicsMagick 1.3.31 allows attackers to cause a denial of service (floating-point exception and application crash) by crafting an XWD image file, a different vulnerability than CVE-2019-11008 and CVE-2019-11009.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11474
reference_id
reference_type
scores
0
value 0.0298
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-01T12:55:00Z
1
value 0.0298
scoring_system epss
scoring_elements 0.86472
published_at 2026-04-02T12:55:00Z
2
value 0.0298
scoring_system epss
scoring_elements 0.8649
published_at 2026-04-07T12:55:00Z
3
value 0.0298
scoring_system epss
scoring_elements 0.86509
published_at 2026-04-08T12:55:00Z
4
value 0.0298
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-09T12:55:00Z
5
value 0.0298
scoring_system epss
scoring_elements 0.86533
published_at 2026-04-11T12:55:00Z
6
value 0.0298
scoring_system epss
scoring_elements 0.8653
published_at 2026-04-12T12:55:00Z
7
value 0.0298
scoring_system epss
scoring_elements 0.86525
published_at 2026-04-13T12:55:00Z
8
value 0.0298
scoring_system epss
scoring_elements 0.8654
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11474
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11474
2
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg15976-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg15976-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg15976-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-11474
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wwqv-tpq5-dqgs
132
url VCID-xvve-pj82-mfh6
vulnerability_id VCID-xvve-pj82-mfh6
summary In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadMIFFImage of coders/miff.c, which allows attackers to cause a denial of service or information disclosure via an RLE packet.
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/f7610c1281c1
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/f7610c1281c1
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11006
reference_id
reference_type
scores
0
value 0.01406
scoring_system epss
scoring_elements 0.80496
published_at 2026-04-16T12:55:00Z
1
value 0.01406
scoring_system epss
scoring_elements 0.80474
published_at 2026-04-12T12:55:00Z
2
value 0.01406
scoring_system epss
scoring_elements 0.80467
published_at 2026-04-13T12:55:00Z
3
value 0.01406
scoring_system epss
scoring_elements 0.80415
published_at 2026-04-01T12:55:00Z
4
value 0.01406
scoring_system epss
scoring_elements 0.80421
published_at 2026-04-02T12:55:00Z
5
value 0.01406
scoring_system epss
scoring_elements 0.80442
published_at 2026-04-04T12:55:00Z
6
value 0.01406
scoring_system epss
scoring_elements 0.80431
published_at 2026-04-07T12:55:00Z
7
value 0.01406
scoring_system epss
scoring_elements 0.80461
published_at 2026-04-08T12:55:00Z
8
value 0.01406
scoring_system epss
scoring_elements 0.80471
published_at 2026-04-09T12:55:00Z
9
value 0.01406
scoring_system epss
scoring_elements 0.80489
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11006
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11006
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
7
reference_url https://sourceforge.net/p/graphicsmagick/bugs/598/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/598/
8
reference_url https://www.debian.org/security/2020/dsa-4640
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4640
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
reference_id 927029
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-11006
reference_id CVE-2019-11006
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-11006
15
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
16
reference_url https://usn.ubuntu.com/5974-1/
reference_id USN-5974-1
reference_type
scores
url https://usn.ubuntu.com/5974-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg15968-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg15968-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-11006
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xvve-pj82-mfh6
133
url VCID-xzye-g5rw-fyh5
vulnerability_id VCID-xzye-g5rw-fyh5
summary
Multiple vulnerabilities have been found in GraphicsMagick,
    allowing remote attackers to execute arbitrary code or cause a Denial of
    Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3736.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3736.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3736
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26117
published_at 2026-04-01T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26198
published_at 2026-04-02T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.2624
published_at 2026-04-04T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26012
published_at 2026-04-07T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26078
published_at 2026-04-08T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.2613
published_at 2026-04-09T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26139
published_at 2026-04-11T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31157
published_at 2026-04-12T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.31113
published_at 2026-04-13T12:55:00Z
9
value 0.00121
scoring_system epss
scoring_elements 0.31146
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3736
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=537941
reference_id 537941
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=537941
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559797
reference_id 559797
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559797
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559801
reference_id 559801
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559801
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559806
reference_id 559806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559806
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559809
reference_id 559809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559809
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559811
reference_id 559811
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559811
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559814
reference_id 559814
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559814
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559815
reference_id 559815
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559815
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559816
reference_id 559816
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559816
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559819
reference_id 559819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559819
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559822
reference_id 559822
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559822
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559824
reference_id 559824
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559824
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559825
reference_id 559825
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559825
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559826
reference_id 559826
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559826
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559829
reference_id 559829
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559829
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559831
reference_id 559831
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559831
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559832
reference_id 559832
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559832
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559833
reference_id 559833
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559833
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559834
reference_id 559834
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559834
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559835
reference_id 559835
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559835
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559836
reference_id 559836
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559836
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559837
reference_id 559837
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559837
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559840
reference_id 559840
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559840
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559844
reference_id 559844
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559844
27
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559845
reference_id 559845
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559845
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702436
reference_id 702436
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702436
29
reference_url https://security.gentoo.org/glsa/201311-10
reference_id GLSA-201311-10
reference_type
scores
url https://security.gentoo.org/glsa/201311-10
30
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
31
reference_url https://access.redhat.com/errata/RHSA-2009:1646
reference_id RHSA-2009:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1646
32
reference_url https://access.redhat.com/errata/RHSA-2010:0039
reference_id RHSA-2010:0039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0039
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.5-6?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.5-6%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2009-3736
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xzye-g5rw-fyh5
134
url VCID-ybrn-yhxe-nya8
vulnerability_id VCID-ybrn-yhxe-nya8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18231.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18231.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18231
reference_id
reference_type
scores
0
value 0.01691
scoring_system epss
scoring_elements 0.82163
published_at 2026-04-01T12:55:00Z
1
value 0.01691
scoring_system epss
scoring_elements 0.82176
published_at 2026-04-02T12:55:00Z
2
value 0.01691
scoring_system epss
scoring_elements 0.82197
published_at 2026-04-04T12:55:00Z
3
value 0.01691
scoring_system epss
scoring_elements 0.82193
published_at 2026-04-07T12:55:00Z
4
value 0.01691
scoring_system epss
scoring_elements 0.82219
published_at 2026-04-08T12:55:00Z
5
value 0.01691
scoring_system epss
scoring_elements 0.82226
published_at 2026-04-09T12:55:00Z
6
value 0.01691
scoring_system epss
scoring_elements 0.82246
published_at 2026-04-11T12:55:00Z
7
value 0.01691
scoring_system epss
scoring_elements 0.82239
published_at 2026-04-12T12:55:00Z
8
value 0.01691
scoring_system epss
scoring_elements 0.82233
published_at 2026-04-13T12:55:00Z
9
value 0.01691
scoring_system epss
scoring_elements 0.82269
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18231
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
58
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1558746
reference_id 1558746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1558746
59
reference_url https://usn.ubuntu.com/4266-1/
reference_id USN-4266-1
reference_type
scores
url https://usn.ubuntu.com/4266-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.27-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-18231
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ybrn-yhxe-nya8
135
url VCID-yyem-nstk-mubj
vulnerability_id VCID-yyem-nstk-mubj
summary security update
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=93bdb9b30076
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=93bdb9b30076
1
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=df946910910d
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=df946910910d
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15238
reference_id
reference_type
scores
0
value 0.00566
scoring_system epss
scoring_elements 0.68489
published_at 2026-04-16T12:55:00Z
1
value 0.00566
scoring_system epss
scoring_elements 0.68496
published_at 2026-04-11T12:55:00Z
2
value 0.00566
scoring_system epss
scoring_elements 0.68484
published_at 2026-04-12T12:55:00Z
3
value 0.00566
scoring_system epss
scoring_elements 0.68451
published_at 2026-04-13T12:55:00Z
4
value 0.00566
scoring_system epss
scoring_elements 0.68387
published_at 2026-04-01T12:55:00Z
5
value 0.00566
scoring_system epss
scoring_elements 0.68407
published_at 2026-04-02T12:55:00Z
6
value 0.00566
scoring_system epss
scoring_elements 0.68427
published_at 2026-04-04T12:55:00Z
7
value 0.00566
scoring_system epss
scoring_elements 0.68403
published_at 2026-04-07T12:55:00Z
8
value 0.00566
scoring_system epss
scoring_elements 0.68454
published_at 2026-04-08T12:55:00Z
9
value 0.00566
scoring_system epss
scoring_elements 0.6847
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15238
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
59
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
60
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
62
reference_url https://sourceforge.net/p/graphicsmagick/bugs/469/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/469/
63
reference_url https://www.debian.org/security/2018/dsa-4321
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4321
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15238
reference_id CVE-2017-15238
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15238
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-14?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-14?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-14%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-15238
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yyem-nstk-mubj
136
url VCID-z9nq-qa26-hfdj
vulnerability_id VCID-z9nq-qa26-hfdj
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11638
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.54571
published_at 2026-04-16T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.54534
published_at 2026-04-13T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.54448
published_at 2026-04-01T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54523
published_at 2026-04-02T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54546
published_at 2026-04-04T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54515
published_at 2026-04-07T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.54567
published_at 2026-04-08T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.54562
published_at 2026-04-09T12:55:00Z
8
value 0.00314
scoring_system epss
scoring_elements 0.54573
published_at 2026-04-11T12:55:00Z
9
value 0.00314
scoring_system epss
scoring_elements 0.54555
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11638
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870154
reference_id 870154
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870154
59
reference_url https://usn.ubuntu.com/4222-1/
reference_id USN-4222-1
reference_type
scores
url https://usn.ubuntu.com/4222-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-4?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-4%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-11638
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z9nq-qa26-hfdj
137
url VCID-zc57-w3bt-qbdc
vulnerability_id VCID-zc57-w3bt-qbdc
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11637
reference_id
reference_type
scores
0
value 0.00418
scoring_system epss
scoring_elements 0.61839
published_at 2026-04-16T12:55:00Z
1
value 0.00418
scoring_system epss
scoring_elements 0.61796
published_at 2026-04-13T12:55:00Z
2
value 0.00418
scoring_system epss
scoring_elements 0.61669
published_at 2026-04-01T12:55:00Z
3
value 0.00418
scoring_system epss
scoring_elements 0.61743
published_at 2026-04-07T12:55:00Z
4
value 0.00418
scoring_system epss
scoring_elements 0.61773
published_at 2026-04-04T12:55:00Z
5
value 0.00418
scoring_system epss
scoring_elements 0.61792
published_at 2026-04-08T12:55:00Z
6
value 0.00418
scoring_system epss
scoring_elements 0.61808
published_at 2026-04-09T12:55:00Z
7
value 0.00418
scoring_system epss
scoring_elements 0.61828
published_at 2026-04-11T12:55:00Z
8
value 0.00418
scoring_system epss
scoring_elements 0.61816
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11637
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
57
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870153
reference_id 870153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870153
59
reference_url https://usn.ubuntu.com/4206-1/
reference_id USN-4206-1
reference_type
scores
url https://usn.ubuntu.com/4206-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.26-4?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.3.26-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.26-4%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2017-11637
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zc57-w3bt-qbdc
138
url VCID-znwq-9jw9-abgx
vulnerability_id VCID-znwq-9jw9-abgx
summary
Multiple vulnerabilities have been found in GraphicsMagick,
    allowing remote attackers to execute arbitrary code or cause a Denial of
    Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1097.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1097.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1097
reference_id
reference_type
scores
0
value 0.06243
scoring_system epss
scoring_elements 0.90851
published_at 2026-04-01T12:55:00Z
1
value 0.06243
scoring_system epss
scoring_elements 0.90857
published_at 2026-04-02T12:55:00Z
2
value 0.06243
scoring_system epss
scoring_elements 0.90867
published_at 2026-04-04T12:55:00Z
3
value 0.06243
scoring_system epss
scoring_elements 0.90877
published_at 2026-04-07T12:55:00Z
4
value 0.06243
scoring_system epss
scoring_elements 0.90889
published_at 2026-04-08T12:55:00Z
5
value 0.06243
scoring_system epss
scoring_elements 0.90896
published_at 2026-04-09T12:55:00Z
6
value 0.06243
scoring_system epss
scoring_elements 0.90905
published_at 2026-04-12T12:55:00Z
7
value 0.06243
scoring_system epss
scoring_elements 0.90903
published_at 2026-04-13T12:55:00Z
8
value 0.06243
scoring_system epss
scoring_elements 0.90928
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1097
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1097
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=285861
reference_id 285861
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=285861
4
reference_url https://security.gentoo.org/glsa/201311-10
reference_id GLSA-201311-10
reference_type
scores
url https://security.gentoo.org/glsa/201311-10
5
reference_url https://access.redhat.com/errata/RHSA-2008:0145
reference_id RHSA-2008:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0145
6
reference_url https://access.redhat.com/errata/RHSA-2008:0165
reference_id RHSA-2008:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0165
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.7-13?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.7-13?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.7-13%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2008-1097
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-znwq-9jw9-abgx
139
url VCID-zvjw-vzvx-6qab
vulnerability_id VCID-zvjw-vzvx-6qab
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19951
reference_id
reference_type
scores
0
value 0.0144
scoring_system epss
scoring_elements 0.80659
published_at 2026-04-01T12:55:00Z
1
value 0.0144
scoring_system epss
scoring_elements 0.80668
published_at 2026-04-02T12:55:00Z
2
value 0.0144
scoring_system epss
scoring_elements 0.80689
published_at 2026-04-04T12:55:00Z
3
value 0.0144
scoring_system epss
scoring_elements 0.80684
published_at 2026-04-07T12:55:00Z
4
value 0.0144
scoring_system epss
scoring_elements 0.80713
published_at 2026-04-08T12:55:00Z
5
value 0.0144
scoring_system epss
scoring_elements 0.80723
published_at 2026-04-09T12:55:00Z
6
value 0.0144
scoring_system epss
scoring_elements 0.80739
published_at 2026-04-11T12:55:00Z
7
value 0.0144
scoring_system epss
scoring_elements 0.80725
published_at 2026-04-12T12:55:00Z
8
value 0.0144
scoring_system epss
scoring_elements 0.80717
published_at 2026-04-13T12:55:00Z
9
value 0.0144
scoring_system epss
scoring_elements 0.80753
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19951
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19950
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953
4
reference_url https://usn.ubuntu.com/USN-5190-1/
reference_id USN-USN-5190-1
reference_type
scores
url https://usn.ubuntu.com/USN-5190-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4~hg16039-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4~hg16039-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4~hg16039-1%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2019-19951
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zvjw-vzvx-6qab
140
url VCID-zz57-zmka-33ev
vulnerability_id VCID-zz57-zmka-33ev
summary
The X.Org X11 library contains multiple integer overflows, which could lead
    to the execution of arbitrary code.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045
1
reference_url http://issues.foresightlinux.org/browse/FL-223
reference_id
reference_type
scores
url http://issues.foresightlinux.org/browse/FL-223
2
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
3
reference_url http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2007-0125.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0125.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1667.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1667.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1667
reference_id
reference_type
scores
0
value 0.02066
scoring_system epss
scoring_elements 0.83953
published_at 2026-04-16T12:55:00Z
1
value 0.02066
scoring_system epss
scoring_elements 0.8386
published_at 2026-04-01T12:55:00Z
2
value 0.02066
scoring_system epss
scoring_elements 0.83874
published_at 2026-04-02T12:55:00Z
3
value 0.02066
scoring_system epss
scoring_elements 0.8389
published_at 2026-04-04T12:55:00Z
4
value 0.02066
scoring_system epss
scoring_elements 0.83892
published_at 2026-04-07T12:55:00Z
5
value 0.02066
scoring_system epss
scoring_elements 0.83915
published_at 2026-04-08T12:55:00Z
6
value 0.02066
scoring_system epss
scoring_elements 0.83922
published_at 2026-04-09T12:55:00Z
7
value 0.02066
scoring_system epss
scoring_elements 0.83938
published_at 2026-04-11T12:55:00Z
8
value 0.02066
scoring_system epss
scoring_elements 0.83932
published_at 2026-04-12T12:55:00Z
9
value 0.02066
scoring_system epss
scoring_elements 0.83929
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1667
7
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667
9
reference_url http://secunia.com/advisories/24739
reference_id
reference_type
scores
url http://secunia.com/advisories/24739
10
reference_url http://secunia.com/advisories/24741
reference_id
reference_type
scores
url http://secunia.com/advisories/24741
11
reference_url http://secunia.com/advisories/24745
reference_id
reference_type
scores
url http://secunia.com/advisories/24745
12
reference_url http://secunia.com/advisories/24756
reference_id
reference_type
scores
url http://secunia.com/advisories/24756
13
reference_url http://secunia.com/advisories/24758
reference_id
reference_type
scores
url http://secunia.com/advisories/24758
14
reference_url http://secunia.com/advisories/24765
reference_id
reference_type
scores
url http://secunia.com/advisories/24765
15
reference_url http://secunia.com/advisories/24771
reference_id
reference_type
scores
url http://secunia.com/advisories/24771
16
reference_url http://secunia.com/advisories/24791
reference_id
reference_type
scores
url http://secunia.com/advisories/24791
17
reference_url http://secunia.com/advisories/24953
reference_id
reference_type
scores
url http://secunia.com/advisories/24953
18
reference_url http://secunia.com/advisories/24975
reference_id
reference_type
scores
url http://secunia.com/advisories/24975
19
reference_url http://secunia.com/advisories/25004
reference_id
reference_type
scores
url http://secunia.com/advisories/25004
20
reference_url http://secunia.com/advisories/25072
reference_id
reference_type
scores
url http://secunia.com/advisories/25072
21
reference_url http://secunia.com/advisories/25112
reference_id
reference_type
scores
url http://secunia.com/advisories/25112
22
reference_url http://secunia.com/advisories/25131
reference_id
reference_type
scores
url http://secunia.com/advisories/25131
23
reference_url http://secunia.com/advisories/25305
reference_id
reference_type
scores
url http://secunia.com/advisories/25305
24
reference_url http://secunia.com/advisories/25992
reference_id
reference_type
scores
url http://secunia.com/advisories/25992
25
reference_url http://secunia.com/advisories/26177
reference_id
reference_type
scores
url http://secunia.com/advisories/26177
26
reference_url http://secunia.com/advisories/30161
reference_id
reference_type
scores
url http://secunia.com/advisories/30161
27
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
28
reference_url http://secunia.com/advisories/36260
reference_id
reference_type
scores
url http://secunia.com/advisories/36260
29
reference_url http://security.gentoo.org/glsa/glsa-200705-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-06.xml
30
reference_url https://issues.rpath.com/browse/RPL-1211
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1211
31
reference_url https://issues.rpath.com/browse/RPL-1213
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1213
32
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693
33
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776
34
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1
35
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
36
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm
37
reference_url http://www.debian.org/security/2007/dsa-1294
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1294
38
reference_url http://www.debian.org/security/2009/dsa-1858
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1858
39
reference_url http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
40
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
41
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:147
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:147
42
reference_url http://www.novell.com/linux/security/advisories/2007_27_x.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_27_x.html
43
reference_url http://www.novell.com/linux/security/advisories/2007_8_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_8_sr.html
44
reference_url http://www.openbsd.org/errata39.html#021_xorg
reference_id
reference_type
scores
url http://www.openbsd.org/errata39.html#021_xorg
45
reference_url http://www.openbsd.org/errata40.html#011_xorg
reference_id
reference_type
scores
url http://www.openbsd.org/errata40.html#011_xorg
46
reference_url http://www.redhat.com/support/errata/RHSA-2007-0126.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0126.html
47
reference_url http://www.redhat.com/support/errata/RHSA-2007-0157.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0157.html
48
reference_url http://www.securityfocus.com/archive/1/464686/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464686/100/0/threaded
49
reference_url http://www.securityfocus.com/archive/1/464816/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464816/100/0/threaded
50
reference_url http://www.securityfocus.com/bid/23300
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23300
51
reference_url http://www.securitytracker.com/id?1017864
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017864
52
reference_url http://www.ubuntu.com/usn/usn-453-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-453-1
53
reference_url http://www.ubuntu.com/usn/usn-453-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-453-2
54
reference_url http://www.ubuntu.com/usn/usn-481-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-481-1
55
reference_url http://www.vupen.com/english/advisories/2007/1217
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1217
56
reference_url http://www.vupen.com/english/advisories/2007/1531
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1531
57
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=231684
reference_id 231684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=231684
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045
reference_id 414045
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045
59
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417862
reference_id 417862
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417862
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1667
reference_id CVE-2007-1667
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-1667
67
reference_url https://security.gentoo.org/glsa/200705-06
reference_id GLSA-200705-06
reference_type
scores
url https://security.gentoo.org/glsa/200705-06
68
reference_url https://access.redhat.com/errata/RHSA-2007:0125
reference_id RHSA-2007:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0125
69
reference_url https://access.redhat.com/errata/RHSA-2007:0126
reference_id RHSA-2007:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0126
70
reference_url https://access.redhat.com/errata/RHSA-2007:0157
reference_id RHSA-2007:0157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0157
71
reference_url https://usn.ubuntu.com/453-1/
reference_id USN-453-1
reference_type
scores
url https://usn.ubuntu.com/453-1/
72
reference_url https://usn.ubuntu.com/481-1/
reference_id USN-481-1
reference_type
scores
url https://usn.ubuntu.com/481-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.1.7-14?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.1.7-14?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.1.7-14%3Fdistro=trixie
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.40-4%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.40-4%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.45%2Bhg17696-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie
4
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.46-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.46-2%3Fdistro=trixie
aliases CVE-2007-1667
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zz57-zmka-33ev
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.45%252Bhg17696-1%3Fdistro=trixie