Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/925289?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/925289?format=api", "purl": "pkg:deb/debian/imagemagick@6:6.0.6.2-1.5?distro=trixie", "type": "deb", "namespace": "debian", "name": "imagemagick", "version": "6:6.0.6.2-1.5", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "6:6.0.6.2-2.1", "latest_non_vulnerable_version": "8:7.1.2.19+dfsg1-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89400?format=api", "vulnerability_id": "VCID-qsna-fp92-syce", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0981.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0981.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0981", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07221", "scoring_system": "epss", "scoring_elements": "0.91635", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07221", "scoring_system": "epss", "scoring_elements": "0.91574", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07221", "scoring_system": "epss", "scoring_elements": "0.91581", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07221", "scoring_system": "epss", "scoring_elements": "0.91587", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07221", "scoring_system": "epss", "scoring_elements": "0.91596", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07221", "scoring_system": "epss", "scoring_elements": "0.91609", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07221", "scoring_system": "epss", "scoring_elements": "0.91615", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07221", "scoring_system": "epss", "scoring_elements": "0.91619", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07221", "scoring_system": "epss", "scoring_elements": "0.91621", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07221", "scoring_system": "epss", "scoring_elements": "0.91618", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07221", "scoring_system": "epss", "scoring_elements": "0.91639", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07221", "scoring_system": "epss", "scoring_elements": "0.91632", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07221", "scoring_system": "epss", "scoring_elements": "0.91637", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0981" }, { "reference_url": "http://secunia.com/advisories/12995/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/12995/" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200411-11.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200411-11.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17903", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17903" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10472" }, { "reference_url": "https://www.ubuntu.com/usn/usn-7-1/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.ubuntu.com/usn/usn-7-1/" }, { "reference_url": "http://www.imagemagick.org/www/Changelog.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.imagemagick.org/www/Changelog.html" }, { "reference_url": "http://www.securityfocus.org/bid/11548", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.org/bid/11548" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617341", "reference_id": "1617341", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617341" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278401", "reference_id": "278401", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278401" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:6.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:6.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:6.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:6.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:6.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:imagemagick:imagemagick:6.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0981", "reference_id": "CVE-2004-0981", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0981" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:636", "reference_id": "RHSA-2004:636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:636" }, { "reference_url": "https://usn.ubuntu.com/10-1/", "reference_id": "USN-10-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/10-1/" }, { "reference_url": "https://usn.ubuntu.com/7-1/", "reference_id": "USN-7-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925289?format=api", "purl": "pkg:deb/debian/imagemagick@6:6.0.6.2-1.5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/imagemagick@6:6.0.6.2-1.5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925284?format=api", "purl": "pkg:deb/debian/imagemagick@8:6.9.11.60%2Bdfsg-1.3%2Bdeb11u4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1cpn-zvem-v7gt" }, { "vulnerability": "VCID-2zje-ag2v-7kac" }, { "vulnerability": "VCID-381g-7gdr-qydg" }, { "vulnerability": "VCID-441f-z9bp-vbdu" }, { "vulnerability": "VCID-54da-fzyt-4ud2" }, { "vulnerability": "VCID-6h7x-3rue-kucp" }, { "vulnerability": "VCID-6v1d-1wfr-vqd1" }, { "vulnerability": "VCID-7gb9-gd78-7bdu" }, { "vulnerability": "VCID-a2qm-vkc3-qkd5" }, { "vulnerability": "VCID-cuhw-ew1g-s3h2" }, { "vulnerability": "VCID-eb4u-x1mt-2uan" }, { "vulnerability": "VCID-eeju-vhdm-aqbe" }, { "vulnerability": "VCID-egwu-28fp-dye6" }, { "vulnerability": "VCID-g41y-dv8u-3yf1" }, { "vulnerability": "VCID-g679-q851-xub7" }, { "vulnerability": "VCID-j6tc-f4fc-mbcv" }, { "vulnerability": "VCID-jc5m-7rvc-2qg6" }, { "vulnerability": "VCID-jcjk-s89c-mbbm" }, { "vulnerability": "VCID-n47w-r932-abey" }, { "vulnerability": "VCID-qjxn-gm96-7ygc" }, { "vulnerability": "VCID-r3vw-ncns-cqgb" }, { "vulnerability": "VCID-rbdg-vz8x-ykah" }, { "vulnerability": "VCID-rjkf-pdny-2fhn" }, { "vulnerability": "VCID-sw7g-hxxr-n3e1" }, { "vulnerability": "VCID-tt6z-t31v-dkdd" }, { "vulnerability": "VCID-tv15-dcnu-pbbn" }, { "vulnerability": "VCID-utfe-h3b7-jqcj" }, { "vulnerability": "VCID-uvkp-1zss-57gr" }, { "vulnerability": "VCID-w9zg-tsbg-afa1" }, { "vulnerability": "VCID-x8c6-9pse-xkc8" }, { "vulnerability": "VCID-y58b-be93-hbfd" }, { "vulnerability": "VCID-zab9-9tqj-hbhg" }, { "vulnerability": "VCID-zvq4-ybph-buga" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/imagemagick@8:6.9.11.60%252Bdfsg-1.3%252Bdeb11u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925282?format=api", "purl": "pkg:deb/debian/imagemagick@8:6.9.11.60%2Bdfsg-1.6%2Bdeb12u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1cpn-zvem-v7gt" }, { "vulnerability": "VCID-2zje-ag2v-7kac" }, { "vulnerability": "VCID-381g-7gdr-qydg" }, { "vulnerability": "VCID-441f-z9bp-vbdu" }, { "vulnerability": "VCID-54da-fzyt-4ud2" }, { "vulnerability": "VCID-6h7x-3rue-kucp" }, { "vulnerability": "VCID-6v1d-1wfr-vqd1" }, { "vulnerability": "VCID-7gb9-gd78-7bdu" }, { "vulnerability": "VCID-a2qm-vkc3-qkd5" }, { "vulnerability": "VCID-cuhw-ew1g-s3h2" }, { "vulnerability": "VCID-eeju-vhdm-aqbe" }, { "vulnerability": "VCID-egwu-28fp-dye6" }, { "vulnerability": "VCID-g41y-dv8u-3yf1" }, { "vulnerability": "VCID-g679-q851-xub7" }, { "vulnerability": "VCID-j6tc-f4fc-mbcv" }, { "vulnerability": "VCID-jc5m-7rvc-2qg6" }, { "vulnerability": "VCID-jcjk-s89c-mbbm" }, { "vulnerability": "VCID-n47w-r932-abey" }, { "vulnerability": "VCID-qjxn-gm96-7ygc" }, { "vulnerability": "VCID-r3vw-ncns-cqgb" }, { "vulnerability": "VCID-rbdg-vz8x-ykah" }, { "vulnerability": "VCID-rjkf-pdny-2fhn" }, { "vulnerability": "VCID-sw7g-hxxr-n3e1" }, { "vulnerability": "VCID-tt6z-t31v-dkdd" }, { "vulnerability": "VCID-tv15-dcnu-pbbn" }, { "vulnerability": "VCID-utfe-h3b7-jqcj" }, { "vulnerability": "VCID-uvkp-1zss-57gr" }, { "vulnerability": "VCID-w9zg-tsbg-afa1" }, { "vulnerability": "VCID-x8c6-9pse-xkc8" }, { "vulnerability": "VCID-y58b-be93-hbfd" }, { "vulnerability": "VCID-zab9-9tqj-hbhg" }, { "vulnerability": "VCID-zvq4-ybph-buga" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/imagemagick@8:6.9.11.60%252Bdfsg-1.6%252Bdeb12u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925287?format=api", "purl": "pkg:deb/debian/imagemagick@8:7.1.1.43%2Bdfsg1-1%2Bdeb13u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2yv5-qdeg-9bag" }, { "vulnerability": "VCID-381g-7gdr-qydg" }, { "vulnerability": "VCID-441f-z9bp-vbdu" }, { "vulnerability": "VCID-4s37-h3p7-6uab" }, { "vulnerability": "VCID-6v1d-1wfr-vqd1" }, { "vulnerability": "VCID-7gb9-gd78-7bdu" }, { "vulnerability": "VCID-a2qm-vkc3-qkd5" }, { "vulnerability": "VCID-eeju-vhdm-aqbe" }, { "vulnerability": "VCID-egwu-28fp-dye6" }, { "vulnerability": "VCID-j6tc-f4fc-mbcv" }, { "vulnerability": "VCID-jc5m-7rvc-2qg6" }, { "vulnerability": "VCID-qjxn-gm96-7ygc" }, { "vulnerability": "VCID-tt6z-t31v-dkdd" }, { "vulnerability": "VCID-uvkp-1zss-57gr" }, { "vulnerability": "VCID-w9zg-tsbg-afa1" }, { "vulnerability": "VCID-zvq4-ybph-buga" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/imagemagick@8:7.1.1.43%252Bdfsg1-1%252Bdeb13u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925285?format=api", "purl": "pkg:deb/debian/imagemagick@8:7.1.2.16%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-jc5m-7rvc-2qg6" }, { "vulnerability": "VCID-tt6z-t31v-dkdd" }, { "vulnerability": "VCID-zvq4-ybph-buga" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/imagemagick@8:7.1.2.16%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925286?format=api", "purl": "pkg:deb/debian/imagemagick@8:7.1.2.18%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2yv5-qdeg-9bag" }, { "vulnerability": "VCID-381g-7gdr-qydg" }, { "vulnerability": "VCID-441f-z9bp-vbdu" }, { "vulnerability": "VCID-4s37-h3p7-6uab" }, { "vulnerability": "VCID-6v1d-1wfr-vqd1" }, { "vulnerability": "VCID-7gb9-gd78-7bdu" }, { "vulnerability": "VCID-eeju-vhdm-aqbe" }, { "vulnerability": "VCID-egwu-28fp-dye6" }, { "vulnerability": "VCID-j6tc-f4fc-mbcv" }, { "vulnerability": "VCID-qjxn-gm96-7ygc" }, { "vulnerability": "VCID-uvkp-1zss-57gr" }, { "vulnerability": "VCID-w9zg-tsbg-afa1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/imagemagick@8:7.1.2.18%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067546?format=api", "purl": "pkg:deb/debian/imagemagick@8:7.1.2.19%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/imagemagick@8:7.1.2.19%252Bdfsg1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0981" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qsna-fp92-syce" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/imagemagick@6:6.0.6.2-1.5%3Fdistro=trixie" }