Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:nuget/Magick.NET-Q16-OpenMP-x86@14.10.3
purl pkg:nuget/Magick.NET-Q16-OpenMP-x86@14.10.3
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (41)
Vulnerability Summary Aliases
VCID-15ny-qqbj-qyfk ImageMagick has infinite loop when writing IPTCTEXT leads to denial of service via crafted profile A crafted profile contain invalid IPTC data may cause an infinite loop when writing it with `IPTCTEXT`. CVE-2026-26066
GHSA-v994-63cg-9wj3
VCID-29r3-kvf4-n3hc ImageMagick: Heap Buffer Over-read in WaveletDenoise when processing small images A heap buffer over-read vulnerability occurs when processing an image with small dimension using the `-wavelet-denoise` operator. ``` ==3693336==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x511000001280 at pc 0x5602c8b0cc75 bp 0x7ffcb105d510 sp 0x7ffcb105d500 READ of size 4 at 0x511000001280 thread T0 ``` CVE-2026-27798
GHSA-qpgx-jfcq-r59f
VCID-5uyd-bv33-h7g1 ImageMagick: Heap overflow in sun decoder on 32-bit systems may result in out of bounds write An Integer Overflow vulnerability exists in the sun decoder. On 32-bit systems/builds, a carefully crafted image can lead to an out of bounds heap write. ``` ================================================================= ==1967675==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf190b50e at pc 0x5eae8777 bp 0xffb0fdd8 sp 0xffb0fdd0 WRITE of size 1 at 0xf190b50e thread T0 ``` CVE-2026-25897
GHSA-6j5f-24fw-pqp4
VCID-5xqd-gf3b-4ygw ImageMagick's Security Policy Bypass through config/policy-secure.xml via "fd handler" leads to stdin/stdout access The shipped “secure” security policy includes a rule intended to prevent reading/writing from standard streams: ```xml <policy domain="path" rights="none" pattern="-"/> ``` However, ImageMagick also supports fd:<n> pseudo-filenames (e.g., fd:0, fd:1). This path form is not blocked by the secure policy templates, and therefore bypasses the protection goal of “no stdin/stdout”. To resolve this, users can add the following change to their security policy. ```xml <policy domain="path" rights="none" pattern="fd:*"/> ``` And this will also be included in ImageMagick's more secure policies by default. CVE-2026-25966
GHSA-xwc6-v6g8-pw2h
VCID-5zkt-kcgx-a3e2 ImageMagick Has Signed Integer Overflow in SIXEL Decoder, Leading to Memory Corruption A signed integer overflow vulnerability in ImageMagick's SIXEL decoder allows an attacker to trigger memory corruption and denial of service when processing a maliciously crafted SIXEL image file. The vulnerability occurs during buffer reallocation operations where pointer arithmetic using signed 32-bit integers overflows. ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==143838==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 #0 0x7f379d5adb53 (/lib/x86_64-linux-gnu/libc.so.6+0xc4b53) ``` CVE-2026-25970
GHSA-xg29-8ghv-v4xr
VCID-62ar-kwbq-nyh3 ImageMagick has memory leak in msl encoder Memory leak exists in `coders/msl.c`. In the `WriteMSLImage` function of the `msl.c` file, resources are allocated. But the function returns early without releasing these allocated resources. ``` ==78983== Memcheck, a memory error detector ==78983== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al. ==78983== Using Valgrind-3.22.0 and LibVEX; rerun with -h for copyright info ==78983== ==78983== 177,196 (13,512 direct, 163,684 indirect) bytes in 1 blocks are definitely lost in loss record 21 of 21 ==78983== at 0x4846828: malloc (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ``` CVE-2026-25638
GHSA-gxcx-qjqp-8vjw
VCID-69f6-ceje-hyah ImageMagick: Malicious PCD files trigger 1‑byte heap Out-of-bounds Read and DoS The PCD coder’s DecodeImage loop allows a crafted PCD file to trigger a 1‑byte heap out-of-bounds read when decoding an image (Denial of service) and potential disclosure of adjacent heap byte. GHSA-wgxp-q8xq-wpp9
VCID-6rma-wjdv-uqe9 mageMagick has a possible use-after-free write in its PDB decoder A use-after-free vulnerability exists in the PDB decoder that will use a stale pointer when a memory allocation fails and that could result in a crash or a single zero byte write. ``` ==4033155==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x5589c1971b24 bp 0x7ffdcc7ae2d0 sp 0x7ffdcc7adb20 T0) ``` ``` ==4034812==ERROR: AddressSanitizer: heap-use-after-free on address 0x7f099e9f7800 at pc 0x5605d909ab20 bp 0x7ffe52045b50 sp 0x7ffe52045b40 WRITE of size 1 at 0x7f099e9f7800 thread T0 ``` GHSA-3j4x-rwrx-xxj9
VCID-6ztv-auh8-27gx ImageMagick: Memory Leak in multiple coders that write raw pixel data A memory leak vulnerability exists in multiple coders that write raw pixel data where an object is not freed. ``` Direct leak of 160 byte(s) in 1 object(s) allocated from: ``` GHSA-wfx3-6g53-9fgc
VCID-anyp-2jr7-73a1 ImageMagick has a possible heap Use After Free vulnerability in its meta coder A heap Use After Free vulnerability exists in the meta coder when an allocation fails and a single byte is written to a stale pointer. ``` ==535852==ERROR: AddressSanitizer: heap-use-after-free on address 0x5210000088ff at pc 0x5581bacac14d bp 0x7ffdf667edf0 sp 0x7ffdf667ede0 WRITE of size 1 at 0x5210000088ff thread T0 ``` GHSA-2gq3-ww97-wfjm
VCID-b5pd-kk97-gban ImageMagick: Converting multi-layer nested MVG to SVG can cause DoS Magick fails to check for multi-layer nested mvg conversions to svg, leading to DoS. CVE-2026-24484
GHSA-wg3g-gvx5-2pmv
VCID-bd1g-sfsp-37h7 ImageMagick: Stack buffer overflow in FTXT reader via oversized integer field ### Summary A stack-based buffer overflow exists in the ImageMagick FTXT image reader. A crafted FTXT file can cause out-of-bounds writes on the stack, leading to a crash. ``` ================================================================= ==3537074==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffee4850ef0 at pc 0x5607c408fb33 bp 0x7ffee484fe50 sp 0x7ffee484fe40 WRITE of size 1 at 0x7ffee4850ef0 thread T0 ``` CVE-2026-25967
GHSA-72hf-fj62-w6j4
VCID-cbqr-aybx-d3e6 ImageMagick has Use After Free in MSLStartElement in "coders/msl.c" A crafted MSL script triggers a heap-use-after-free. The operation element handler replaces and frees the image while the parser continues reading from it, leading to a UAF in ReadBlobString during further parsing. CVE-2026-25983
GHSA-fwqw-2x5x-w566
VCID-d8yf-8rff-3yhf ImageMagick has a possible infinite loop in its JPEG encoder when using `jpeg:extent` A `continue` statement in the JPEG extent binary search loop in the jpeg encoder causes an infinite loop when writing persistently fails. An attacker can trigger a 100% CPU consumption and process hang (Denial of Service) with a crafted image. CVE-2026-26283
GHSA-gwr3-x37h-h84v
VCID-dtza-65ku-aber ImageMagick has NULL pointer dereference in ReadSFWImage after DestroyImageInfo (sfw.c) In `ReadSFWImage()` (`coders/sfw.c`), when temporary file creation fails, `read_info` is destroyed before its `filename` member is accessed, causing a NULL pointer dereference and crash. ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==1414421==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x56260222912f bp 0x7ffec0a193b0 sp 0x7ffec0a19360 T0) #0 0x56260222912f (/data/ylwang/LargeScan/targets/ImageMagick/utilities/magick+0x235f12f) ``` CVE-2026-25795
GHSA-p33r-fqw2-rqmm
VCID-emmr-15qp-vfah ImageMagick has Global Buffer Overflow (OOB Read) via Negative Pixel Index in UIL and XPM Writer The UIL and XPM image encoder do not validate the pixel index value returned by `GetPixelIndex()` before using it as an array subscript. In HDRI builds, `Quantum` is a floating-point type, so pixel index values can be negative. An attacker can craft an image with negative pixel index values to trigger a global buffer overflow read during conversion, leading to information disclosure or a process crash. ``` READ of size 1 at 0x55a8823a776e thread T0 #0 0x55a880d01e85 in WriteUILImage coders/uil.c:355 ``` ``` READ of size 1 at 0x55fa1c04c66e thread T0 #0 0x55fa1a9ee415 in WriteXPMImage coders/xpm.c:1135 ``` CVE-2026-25898
GHSA-vpxv-r9pg-7gpr
VCID-f1zu-xb4j-8qhp ImageMagick has a heap buffer over-read in its MAP image decoder A heap buffer over-read vulnerability exists in the MAP image decoder when processing crafted MAP files, potentially leading to crashes or unintended memory disclosure during image decoding. ``` ================================================================= ==4070926==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x502000002b31 at pc 0x56517afbd910 bp 0x7ffc59e90000 sp 0x7ffc59e8fff0 READ of size 1 at 0x502000002b31 thread T0 ``` CVE-2026-25987
GHSA-42p5-62qq-mmh7
VCID-fnck-7mvx-hqc9 ImageMagick has a heap Buffer Over-read in its DJVU image format handler A heap Buffer Over-read vulnerability exists in the DJVU image format handler. The vulnerability occurs due to integer truncation when calculating the stride (row size) for pixel buffer allocation. The stride calculation overflows a 32-bit signed integer, resulting in an out-of-bounds memory reads. CVE-2026-27799
GHSA-r99p-5442-q2x2
VCID-gdg8-aejn-83c4 ImageMagick: Policy bypass through path traversal allows reading restricted content despite secured policy ImageMagick’s path security policy is enforced on the raw filename string before the filesystem resolves it. As a result, a policy rule such as /etc/* can be bypassed by a path traversal. The OS resolves the traversal and opens the sensitive file, but the policy matcher only sees the unnormalized path and therefore allows the read. This enables local file disclosure (LFI) even when policy-secure.xml is applied. Actions to prevent reading from files have been taken. But it make sure writing is also not possible the following should be added to your policy: ``` <policy domain="path" rights="none" pattern="*../*"/> ``` And this will also be included in the project's more secure policies by default. CVE-2026-25965
GHSA-8jvj-p28h-9gm7
VCID-jcjk-s89c-mbbm ImageMagick: Invalid MSL <map> can result in a use after free The MSL interpreter crashes when processing a invalid `<map>` element that causes it to use an image after it has been freed. CVE-2026-26983
GHSA-w8mw-frc6-r7m8
VCID-jvq6-xjbu-fkb9 ImageMagick: Infinite loop vulnerability when parsing a PCD file When a PCD file does not contain a valid marker, the DecodeImage() function becomes trapped in an infinite loop while searching for the marker, causing the program to become unresponsive and continuously consume CPU resources, ultimately leading to system resource exhaustion and denial of service. CVE-2026-24485
GHSA-pqgj-2p96-rx85
VCID-kdw5-8y5z-zya5 ImageMagick: Possible memory leak in ASHLAR encoder A memory leak in the ASHLAR image writer allows an attacker to exhaust process memory by providing a crafted image that results in small objects that are allocated but never freed. ``` ==880062== Memcheck, a memory error detector ==880062== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==880062== Using Valgrind-3.18.1 and LibVEX; rerun with -h for copyright info ==880062== ==880062== ==880062== HEAP SUMMARY: ==880062== in use at exit: 386,826 bytes in 696 blocks ==880062== total heap usage: 30,523 allocs, 29,827 frees, 21,803,756 bytes allocated ==880062== ==880062== LEAK SUMMARY: ==880062== definitely lost: 3,408 bytes in 3 blocks ==880062== indirectly lost: 88,885 bytes in 30 blocks ==880062== possibly lost: 140,944 bytes in 383 blocks ==880062== still reachable: 151,573 bytes in 259 blocks ==880062== suppressed: 0 bytes in 0 blocks ==880062== Reachable blocks (those to which a pointer was found) are not shown. ==880062== To see them, rerun with: --leak-check=full --show-leak-kinds=all ==880062== ==880062== For lists of detected and suppressed errors, rerun with: -s ==880062== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0) ``` CVE-2026-25637
GHSA-gm37-qx7w-p258
VCID-kefv-kpkk-wudf ImageMagick has Division-by-Zero in YUV sampling factor validation, which leads to crash A logic error in YUV sampling factor validation allows an invalid sampling factor to bypass checks and trigger a division-by-zero during image loading, resulting in a reliable denial-of-service. ``` coders/yuv.c:210:47: runtime error: division by zero AddressSanitizer:DEADLYSIGNAL ================================================================= ==3543373==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x55deeb4d723c bp 0x7fffc28d34d0 sp 0x7fffc28d3320 T0) #0 0x55deeb4d723c in ReadYUVImage coders/yuv.c:210 #1 0x55deeb751dff in ReadImage MagickCore/constitute.c:743 #2 0x55deeb756374 in ReadImages MagickCore/constitute.c:1082 #3 0x55deec682375 in CLINoImageOperator MagickWand/operation.c:4959 #4 0x55deec6887ed in CLIOption MagickWand/operation.c:5473 #5 0x55deec32843b in ProcessCommandOptions MagickWand/magick-cli.c:653 #6 0x55deec32b99b in MagickImageCommand MagickWand/magick-cli.c:1392 #7 0x55deec324d58 in MagickCommandGenesis MagickWand/magick-cli.c:177 #8 0x55deead82519 in MagickMain utilities/magick.c:162 #9 0x55deead828be in main utilities/magick.c:193 #10 0x7fb90807fd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #11 0x7fb90807fe3f in __libc_start_main_impl ../csu/libc-start.c:392 #12 0x55deead81974 in _start (/data/ylwang/LargeScan/targets/ImageMagick/utilities/magick+0x22fb974) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: UNKNOWN SIGNAL coders/yuv.c:210 in ReadYUVImage ==3543373==ABORTING ``` CVE-2026-25799
GHSA-543g-8grm-9cw6
VCID-mntx-6yku-3qcx ImageMagick: SVG-to-MVG Command Injection via coders/svg.c An attacker can inject arbitrary MVG (Magick Vector Graphics) drawing commands in an SVG file that is read by the internal SVG decoder of ImageMagick. The injected MVG commands execute during rendering. GHSA-xpg8-7m6m-jf56
VCID-p5aw-n691-nkff ImageMagick: MSL image stack index may fail to refresh, leading to leaked images Sometimes msl.c fails to update the stack index, so an image is stored in the wrong slot and never freed on error, causing leaks. ``` ==841485==ERROR: LeakSanitizer: detected memory leaks Direct leak of 13512 byte(s) in 1 object(s) allocated from: #0 0x7ff330759887 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145 ``` CVE-2026-25988
GHSA-782x-jh29-9mf7
VCID-pcme-bwan-3bcf ImageMagick has NULL Pointer Dereference in ClonePixelCacheRepository via crafted image A NULL pointer dereference in ClonePixelCacheRepository allows a remote attacker to crash any application linked against ImageMagick by supplying a crafted image file, resulting in Denial of Service. ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==3704942==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x7f9d141239e0 bp 0x7ffd4c5711e0 sp 0x7ffd4c571148 T0) #0 0x7f9d141239e0 (/lib/x86_64-linux-gnu/libc.so.6+0xc49e0) #1 0x558a25e4f08d in ClonePixelCacheRepository._omp_fn.0 MagickCore/cache.c:784 #2 0x7f9d14c06a15 in GOMP_parallel (/lib/x86_64-linux-gnu/libgomp.so.1+0x14a15) #3 0x558a25e43151 in ClonePixelCacheRepository MagickCore/cache.c:753 #4 0x558a25e49a96 in OpenPixelCache MagickCore/cache.c:3849 #5 0x558a25e45117 in GetImagePixelCache MagickCore/cache.c:1829 #6 0x558a25e4dde3 in SyncImagePixelCache MagickCore/cache.c:5647 #7 0x558a256ba57d in SetImageExtent MagickCore/image.c:2713 ``` CVE-2026-25798
GHSA-p863-5fgm-rgq4
VCID-ruf5-255v-sfdb ImageMagick: Out of bounds read in multiple coders read raw pixel data A heap buffer over-read vulnerability exists in multiple raw image format handles. The vulnerability occurs when processing images with -extract dimensions larger than -size dimensions, causing out-of-bounds memory reads from a heap-allocated buffer. CVE-2026-25576
GHSA-jv4p-gjwq-9r2j
VCID-sd54-b8z1-2fg7 ImageMagick: Integer overflow or wraparound and incorrect conversion between numeric types in the internal SVG decoder A crafted SVG file can cause a denial of service. An off-by-one boundary check (`>` instead of `>=`) that allows bypass the guard and reach an undefined `(size_t)` cast. CVE-2026-25989
GHSA-7355-pwx2-pm84
VCID-sd7w-6qv5-73ge ImageMagick: Integer Overflow in PSB (PSD v2) RLE decoding path causes heap Out of Bounds reads for 32-bit builds An integer overflow in the PSB (PSD v2) RLE decoding path causes a heap out-of-bounds read on 32-bit builds. This can lead to information disclosure or a crash when processing crafted PSB files. ``` ================================================================= ==3298==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf512eb00 at pc 0xf76760b5 bp 0xffc1dfb8 sp 0xffc1dfa8 READ of size 8 at 0xf512eb00 thread T0 #0 0xf76760b4 in ReadPSDChannelRLE coders/psd.c:1141 ``` CVE-2026-25984
GHSA-273h-m46v-96q4
VCID-sdc2-fcap-abaz ImageMagick has Heap Out-of-Bounds Read in DCM Decoder (ReadDCMImage) A heap out-of-bounds read vulnerability exists in the `coders/dcm.c` module. When processing DICOM files with a specific configuration, the decoder loop incorrectly reads bytes per iteration. This causes the function to read past the end of the allocated buffer, potentially leading to a Denial of Service (crash) or Information Disclosure (leaking heap memory into the image). CVE-2026-25982
GHSA-pmq6-8289-hx3v
VCID-tv15-dcnu-pbbn ImageMagick: Heap overflow in pcd decoder leads to out of bounds read. The pcd coder lacks proper boundary checking when processing Huffman-coded data. The decoder contains an function that has an incorrect initialization that could cause an out of bounds read. ``` ==3900053==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x502000003c6c at pc 0x55601b9cc552 bp 0x7ffd904b1f70 sp 0x7ffd904b1f60 READ of size 1 at 0x502000003c6c thread T0 ``` CVE-2026-26284
GHSA-wrhr-rf8j-r842
VCID-utfe-h3b7-jqcj ImageMagick: MSL - Stack overflow in ProcessMSLScript ### Summary Magick fails to check for circular references between two MSLs, leading to a stack overflow. ### Details After reading a.msl using magick, the following is displayed: `MSLStartElement` -> `ReadImage` -> `ReadMSLImage` -> `ProcessMSLScript` -> `xmlParseChunk` -> `xmlParseTryOrFinish` -> `MSLStartElement` ```bash AddressSanitizer:DEADLYSIGNAL ================================================================= ==114345==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x72509fc7d804 bp 0x7ffd6598b390 sp 0x7ffd6598ab20 T0) #0 0x72509fc7d804 in strlen ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:388 [...] ``` CVE-2026-25971
GHSA-8mpr-6xr2-chhc
VCID-uvpj-a8v5-ebgz Image Magick has a Memory Leak in coders/ashlar.c Memory leak exists in `coders/ashlar.c`. The `WriteASHLARImage` allocates a structure. However, when an exception is thrown, the allocated memory is not properly released, resulting in a potential memory leak. ``` ```bash ==78968== Memcheck, a memory error detector ==78968== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al. ==78968== Using Valgrind-3.22.0 and LibVEX; rerun with -h for copyright info ==78968== ==78968== HEAP SUMMARY: ==78968== in use at exit: 17,232 bytes in 4 blocks ==78968== total heap usage: 4,781 allocs, 4,777 frees, 785,472 bytes allocated ``` CVE-2026-25969
GHSA-xgm3-v4r9-wfgm
VCID-vpdn-g1k9-1kdn ImageMagick has heap buffer overflow in YUV 4:2:2 decoder A heap buffer overflow write vulnerability exists in ReadYUVImage() (coders/yuv.c) when processing malicious YUV 4:2:2 (NoInterlace) images. The pixel-pair loop writes one pixel beyond the allocated row buffer. ``` ================================================================= ==204642==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x5170000002e0 at pc 0x562d21a7e8de bp 0x7fffa9ae1270 sp 0x7fffa9ae1260 WRITE of size 8 at 0x5170000002e0 thread T0 ``` CVE-2026-25986
GHSA-mqfc-82jx-3mr2
VCID-x44m-x33k-hydn ImageMagick: Heap-based Buffer Overflow in GetPixelIndex due to metadata-cache desynchronization `OpenPixelCache` updates image channel metadata **before** attempting pixel cache memory allocation. When both memory and disk allocation fail a heap-buffer-overflow read in occurs in any writer that calls `GetPixelIndex`. GHSA-gq5v-qf8q-fp77
VCID-xbsu-ac6g-53fn ImageMagick has heap-buffer-overflow via signed integer overflow in WriteUHDRImage when writing UHDR images with large dimensions `WriteUHDRImage` in `coders/uhdr.c` uses `int` arithmetic to compute the pixel buffer size. When image dimensions are large, the multiplication overflows 32-bit `int`, causing an undersized heap allocation followed by an out-of-bounds write. This can crash the process or potentially lead to an out of bounds heap write. ``` ==1575126==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fc382ef3820 at pc 0x5560d31f229f bp 0x7ffe865f9530 sp 0x7ffe865f9520 WRITE of size 8 at 0x7fc382ef3820 thread T0 #0 0x5560d31f229e in WriteUHDRImage coders/uhdr.c:807 ``` CVE-2026-25794
GHSA-vhqj-f5cj-9x8h
VCID-y4hn-6bv6-jugw ImageMagick: MSL attribute stack buffer overflow leads to out of bounds write. A stack buffer overflow occurs when processing the an attribute in msl.c. A long value overflows a fixed-size stack buffer, leading to memory corruption. ``` ================================================================= ==278522==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffdb8c76984 at pc 0x55a4bf16f507 bp 0x7ffdb8c75bc0 sp 0x7ffdb8c75bb0 WRITE of size 1 at 0x7ffdb8c76984 thread T0 ``` CVE-2026-25968
GHSA-3mwp-xqp2-q6ph
VCID-yx7r-r7ez-7uhp ImageMagick: Code Injection via PostScript header in ps coders The ps encoders, responsible for writing PostScript files, fails to sanitize the input before writing it into the PostScript header. An attacker can provide a malicious file and inject arbitrary PostScript code. When the resulting file is processed by a printer or a viewer (like Ghostscript), the injected code is interpreted and executed. The html encoder does not properly escape strings that are written to in the html document. An attacker can provide a malicious file and injection arbitrary html code. CVE-2026-25797
GHSA-rw6c-xp26-225v
VCID-z9t9-bxf9-hkfk ImageMagick has memory leak of watermark Image object in ReadSTEGANOImage on multiple error/early-return paths ### Summary In `ReadSTEGANOImage()` (`coders/stegano.c`), the `watermark` Image object is not freed on three early-return paths, resulting in a definite memory leak (~13.5KB+ per invocation) that can be exploited for denial of service. ``` Direct leak of 13512 byte(s) in 1 object(s) allocated from: #0 0x7f5c11e27887 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145 #1 0x55cdc38f65c4 in AcquireMagickMemory MagickCore/memory.c:536 #2 0x55cdc38f65eb in AcquireCriticalMemory MagickCore/memory.c:612 #3 0x55cdc3899e91 in AcquireImage MagickCore/image.c:154 ``` CVE-2026-25796
GHSA-g2pr-qxjg-7r2w
VCID-zab9-9tqj-hbhg ImageMagick: Memory allocation with excessive without limits in the internal SVG decoder A crafted SVG file containing an malicious element causes ImageMagick to attempt to allocate ~674 GB of memory, leading to an out-of-memory abort. Found via AFL++ fuzzing with afl-clang-lto instrumentation and AddressSanitizer. CVE-2026-25985
GHSA-v7g2-m8c5-mf84
VCID-zx14-t8et-ufcq ImageMagick: Memory leak in coders/txt.c without freetype If a `texture` attribute is specified for a TXT file, an attempt will be made to read it via `texture=ReadImage(read_info,exception);`. Later, when retrieving metrics via the `GetTypeMetrics` function, if this function fails (i.e., `status == MagickFalse`), the calling function will exit immediately but fail to release the texture object, leading to memory leakage. GHSA-3q5f-gmjc-38r8

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-12T21:33:45.842419+00:00 GitLab Importer Fixing VCID-5zkt-kcgx-a3e2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25970.yml 38.3.0
2026-04-12T21:33:41.585552+00:00 GitLab Importer Fixing VCID-vpdn-g1k9-1kdn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25986.yml 38.3.0
2026-04-12T21:33:41.464571+00:00 GitLab Importer Fixing VCID-utfe-h3b7-jqcj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25971.yml 38.3.0
2026-04-12T21:33:39.602232+00:00 GitLab Importer Fixing VCID-y4hn-6bv6-jugw https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25968.yml 38.3.0
2026-04-12T21:33:38.421543+00:00 GitLab Importer Fixing VCID-sdc2-fcap-abaz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25982.yml 38.3.0
2026-04-12T21:33:34.445650+00:00 GitLab Importer Fixing VCID-tv15-dcnu-pbbn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-26284.yml 38.3.0
2026-04-09T22:49:50.438043+00:00 GithubOSV Importer Fixing VCID-xbsu-ac6g-53fn https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-vhqj-f5cj-9x8h/GHSA-vhqj-f5cj-9x8h.json 38.1.0
2026-04-01T16:08:33.265668+00:00 GHSA Importer Fixing VCID-tv15-dcnu-pbbn https://github.com/advisories/GHSA-wrhr-rf8j-r842 38.0.0
2026-04-01T16:08:32.878036+00:00 GHSA Importer Fixing VCID-vpdn-g1k9-1kdn https://github.com/advisories/GHSA-mqfc-82jx-3mr2 38.0.0
2026-04-01T16:08:32.785619+00:00 GHSA Importer Fixing VCID-sdc2-fcap-abaz https://github.com/advisories/GHSA-pmq6-8289-hx3v 38.0.0
2026-04-01T16:08:32.503840+00:00 GHSA Importer Fixing VCID-utfe-h3b7-jqcj https://github.com/advisories/GHSA-8mpr-6xr2-chhc 38.0.0
2026-04-01T16:08:32.039069+00:00 GHSA Importer Fixing VCID-5zkt-kcgx-a3e2 https://github.com/advisories/GHSA-xg29-8ghv-v4xr 38.0.0
2026-04-01T16:08:31.870387+00:00 GHSA Importer Fixing VCID-y4hn-6bv6-jugw https://github.com/advisories/GHSA-3mwp-xqp2-q6ph 38.0.0
2026-04-01T16:08:14.552134+00:00 GHSA Importer Fixing VCID-fnck-7mvx-hqc9 https://github.com/advisories/GHSA-r99p-5442-q2x2 38.0.0
2026-04-01T16:08:14.230847+00:00 GHSA Importer Fixing VCID-29r3-kvf4-n3hc https://github.com/advisories/GHSA-qpgx-jfcq-r59f 38.0.0
2026-04-01T16:08:14.122815+00:00 GHSA Importer Fixing VCID-x44m-x33k-hydn https://github.com/advisories/GHSA-gq5v-qf8q-fp77 38.0.0
2026-04-01T16:08:13.784180+00:00 GHSA Importer Fixing VCID-6ztv-auh8-27gx https://github.com/advisories/GHSA-wfx3-6g53-9fgc 38.0.0
2026-04-01T16:08:13.496509+00:00 GHSA Importer Fixing VCID-zx14-t8et-ufcq https://github.com/advisories/GHSA-3q5f-gmjc-38r8 38.0.0
2026-04-01T16:08:13.045654+00:00 GHSA Importer Fixing VCID-mntx-6yku-3qcx https://github.com/advisories/GHSA-xpg8-7m6m-jf56 38.0.0
2026-04-01T16:08:12.952340+00:00 GHSA Importer Fixing VCID-69f6-ceje-hyah https://github.com/advisories/GHSA-wgxp-q8xq-wpp9 38.0.0
2026-04-01T16:08:12.623482+00:00 GHSA Importer Fixing VCID-6rma-wjdv-uqe9 https://github.com/advisories/GHSA-3j4x-rwrx-xxj9 38.0.0
2026-04-01T16:08:12.412552+00:00 GHSA Importer Fixing VCID-anyp-2jr7-73a1 https://github.com/advisories/GHSA-2gq3-ww97-wfjm 38.0.0
2026-04-01T16:08:11.439000+00:00 GHSA Importer Fixing VCID-sd7w-6qv5-73ge https://github.com/advisories/GHSA-273h-m46v-96q4 38.0.0
2026-04-01T16:08:10.895808+00:00 GHSA Importer Fixing VCID-jcjk-s89c-mbbm https://github.com/advisories/GHSA-w8mw-frc6-r7m8 38.0.0
2026-04-01T16:08:10.624266+00:00 GHSA Importer Fixing VCID-d8yf-8rff-3yhf https://github.com/advisories/GHSA-gwr3-x37h-h84v 38.0.0
2026-04-01T16:08:10.173966+00:00 GHSA Importer Fixing VCID-15ny-qqbj-qyfk https://github.com/advisories/GHSA-v994-63cg-9wj3 38.0.0
2026-04-01T16:08:09.991180+00:00 GHSA Importer Fixing VCID-sd54-b8z1-2fg7 https://github.com/advisories/GHSA-7355-pwx2-pm84 38.0.0
2026-04-01T16:08:09.529149+00:00 GHSA Importer Fixing VCID-p5aw-n691-nkff https://github.com/advisories/GHSA-782x-jh29-9mf7 38.0.0
2026-04-01T16:08:09.292291+00:00 GHSA Importer Fixing VCID-f1zu-xb4j-8qhp https://github.com/advisories/GHSA-42p5-62qq-mmh7 38.0.0
2026-04-01T16:08:09.053037+00:00 GHSA Importer Fixing VCID-zab9-9tqj-hbhg https://github.com/advisories/GHSA-v7g2-m8c5-mf84 38.0.0
2026-04-01T16:08:08.666831+00:00 GHSA Importer Fixing VCID-cbqr-aybx-d3e6 https://github.com/advisories/GHSA-fwqw-2x5x-w566 38.0.0
2026-04-01T16:08:08.350263+00:00 GHSA Importer Fixing VCID-uvpj-a8v5-ebgz https://github.com/advisories/GHSA-xgm3-v4r9-wfgm 38.0.0
2026-04-01T16:08:08.183510+00:00 GHSA Importer Fixing VCID-bd1g-sfsp-37h7 https://github.com/advisories/GHSA-72hf-fj62-w6j4 38.0.0
2026-04-01T16:08:07.885601+00:00 GHSA Importer Fixing VCID-5xqd-gf3b-4ygw https://github.com/advisories/GHSA-xwc6-v6g8-pw2h 38.0.0
2026-04-01T16:08:07.606382+00:00 GHSA Importer Fixing VCID-gdg8-aejn-83c4 https://github.com/advisories/GHSA-8jvj-p28h-9gm7 38.0.0
2026-04-01T16:08:07.316051+00:00 GHSA Importer Fixing VCID-emmr-15qp-vfah https://github.com/advisories/GHSA-vpxv-r9pg-7gpr 38.0.0
2026-04-01T16:08:07.044282+00:00 GHSA Importer Fixing VCID-5uyd-bv33-h7g1 https://github.com/advisories/GHSA-6j5f-24fw-pqp4 38.0.0
2026-04-01T16:08:06.833195+00:00 GHSA Importer Fixing VCID-kefv-kpkk-wudf https://github.com/advisories/GHSA-543g-8grm-9cw6 38.0.0
2026-04-01T16:08:06.517791+00:00 GHSA Importer Fixing VCID-pcme-bwan-3bcf https://github.com/advisories/GHSA-p863-5fgm-rgq4 38.0.0
2026-04-01T16:08:06.196124+00:00 GHSA Importer Fixing VCID-yx7r-r7ez-7uhp https://github.com/advisories/GHSA-rw6c-xp26-225v 38.0.0
2026-04-01T16:08:05.831271+00:00 GHSA Importer Fixing VCID-z9t9-bxf9-hkfk https://github.com/advisories/GHSA-g2pr-qxjg-7r2w 38.0.0
2026-04-01T16:08:05.753437+00:00 GHSA Importer Fixing VCID-dtza-65ku-aber https://github.com/advisories/GHSA-p33r-fqw2-rqmm 38.0.0
2026-04-01T16:08:05.356365+00:00 GHSA Importer Fixing VCID-xbsu-ac6g-53fn https://github.com/advisories/GHSA-vhqj-f5cj-9x8h 38.0.0
2026-04-01T16:08:05.085199+00:00 GHSA Importer Fixing VCID-62ar-kwbq-nyh3 https://github.com/advisories/GHSA-gxcx-qjqp-8vjw 38.0.0
2026-04-01T16:08:04.821006+00:00 GHSA Importer Fixing VCID-kdw5-8y5z-zya5 https://github.com/advisories/GHSA-gm37-qx7w-p258 38.0.0
2026-04-01T16:08:04.332367+00:00 GHSA Importer Fixing VCID-ruf5-255v-sfdb https://github.com/advisories/GHSA-jv4p-gjwq-9r2j 38.0.0
2026-04-01T16:08:04.149207+00:00 GHSA Importer Fixing VCID-jvq6-xjbu-fkb9 https://github.com/advisories/GHSA-pqgj-2p96-rx85 38.0.0
2026-04-01T16:08:03.931704+00:00 GHSA Importer Fixing VCID-b5pd-kk97-gban https://github.com/advisories/GHSA-wg3g-gvx5-2pmv 38.0.0
2026-04-01T12:54:12.839661+00:00 GithubOSV Importer Fixing VCID-5zkt-kcgx-a3e2 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-xg29-8ghv-v4xr/GHSA-xg29-8ghv-v4xr.json 38.0.0
2026-04-01T12:54:09.341277+00:00 GithubOSV Importer Fixing VCID-tv15-dcnu-pbbn https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-wrhr-rf8j-r842/GHSA-wrhr-rf8j-r842.json 38.0.0
2026-04-01T12:54:08.265770+00:00 GitLab Importer Fixing VCID-sd7w-6qv5-73ge https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25984.yml 38.0.0
2026-04-01T12:54:08.212786+00:00 GitLab Importer Fixing VCID-x44m-x33k-hydn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/GHSA-gq5v-qf8q-fp77.yml 38.0.0
2026-04-01T12:54:08.199146+00:00 GitLab Importer Fixing VCID-29r3-kvf4-n3hc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-27798.yml 38.0.0
2026-04-01T12:54:07.506831+00:00 GitLab Importer Fixing VCID-mntx-6yku-3qcx https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/GHSA-xpg8-7m6m-jf56.yml 38.0.0
2026-04-01T12:54:07.491326+00:00 GitLab Importer Fixing VCID-zx14-t8et-ufcq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/GHSA-3q5f-gmjc-38r8.yml 38.0.0
2026-04-01T12:54:07.107772+00:00 GitLab Importer Fixing VCID-6rma-wjdv-uqe9 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/GHSA-3j4x-rwrx-xxj9.yml 38.0.0
2026-04-01T12:54:05.992537+00:00 GitLab Importer Fixing VCID-fnck-7mvx-hqc9 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-27799.yml 38.0.0
2026-04-01T12:54:05.797830+00:00 GithubOSV Importer Fixing VCID-utfe-h3b7-jqcj https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-8mpr-6xr2-chhc/GHSA-8mpr-6xr2-chhc.json 38.0.0
2026-04-01T12:54:05.613322+00:00 GitLab Importer Fixing VCID-69f6-ceje-hyah https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/GHSA-wgxp-q8xq-wpp9.yml 38.0.0
2026-04-01T12:54:05.515014+00:00 GitLab Importer Fixing VCID-anyp-2jr7-73a1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/GHSA-2gq3-ww97-wfjm.yml 38.0.0
2026-04-01T12:54:05.361635+00:00 GitLab Importer Fixing VCID-6ztv-auh8-27gx https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/GHSA-wfx3-6g53-9fgc.yml 38.0.0
2026-04-01T12:54:05.208532+00:00 GitLab Importer Fixing VCID-jcjk-s89c-mbbm https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-26983.yml 38.0.0
2026-04-01T12:54:04.216151+00:00 GitLab Importer Fixing VCID-uvpj-a8v5-ebgz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25969.yml 38.0.0
2026-04-01T12:54:04.068116+00:00 GitLab Importer Fixing VCID-62ar-kwbq-nyh3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25638.yml 38.0.0
2026-04-01T12:54:04.022096+00:00 GitLab Importer Fixing VCID-kefv-kpkk-wudf https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25799.yml 38.0.0
2026-04-01T12:54:03.867989+00:00 GitLab Importer Fixing VCID-cbqr-aybx-d3e6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25983.yml 38.0.0
2026-04-01T12:54:03.522400+00:00 GitLab Importer Fixing VCID-pcme-bwan-3bcf https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25798.yml 38.0.0
2026-04-01T12:54:03.364415+00:00 GitLab Importer Fixing VCID-dtza-65ku-aber https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25795.yml 38.0.0
2026-04-01T12:54:03.300297+00:00 GitLab Importer Fixing VCID-5uyd-bv33-h7g1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25897.yml 38.0.0
2026-04-01T12:54:02.544599+00:00 GitLab Importer Fixing VCID-xbsu-ac6g-53fn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25794.yml 38.0.0
2026-04-01T12:54:02.298245+00:00 GitLab Importer Fixing VCID-sd54-b8z1-2fg7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25989.yml 38.0.0
2026-04-01T12:54:02.145629+00:00 GitLab Importer Fixing VCID-kdw5-8y5z-zya5 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25637.yml 38.0.0
2026-04-01T12:54:01.714939+00:00 GitLab Importer Fixing VCID-d8yf-8rff-3yhf https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-26283.yml 38.0.0
2026-04-01T12:54:00.669669+00:00 GitLab Importer Fixing VCID-bd1g-sfsp-37h7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25967.yml 38.0.0
2026-04-01T12:54:00.604601+00:00 GitLab Importer Fixing VCID-p5aw-n691-nkff https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25988.yml 38.0.0
2026-04-01T12:53:59.839196+00:00 GitLab Importer Fixing VCID-jvq6-xjbu-fkb9 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-24485.yml 38.0.0
2026-04-01T12:53:59.674716+00:00 GitLab Importer Fixing VCID-ruf5-255v-sfdb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25576.yml 38.0.0
2026-04-01T12:53:59.658841+00:00 GitLab Importer Fixing VCID-f1zu-xb4j-8qhp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25987.yml 38.0.0
2026-04-01T12:53:59.212281+00:00 GitLab Importer Fixing VCID-15ny-qqbj-qyfk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-26066.yml 38.0.0
2026-04-01T12:53:59.069575+00:00 GitLab Importer Fixing VCID-zab9-9tqj-hbhg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25985.yml 38.0.0
2026-04-01T12:53:58.989562+00:00 GitLab Importer Fixing VCID-b5pd-kk97-gban https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-24484.yml 38.0.0
2026-04-01T12:53:58.811995+00:00 GitLab Importer Fixing VCID-5xqd-gf3b-4ygw https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25966.yml 38.0.0
2026-04-01T12:53:58.796196+00:00 GitLab Importer Fixing VCID-gdg8-aejn-83c4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25965.yml 38.0.0
2026-04-01T12:53:58.626643+00:00 GitLab Importer Fixing VCID-emmr-15qp-vfah https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25898.yml 38.0.0
2026-04-01T12:53:57.611559+00:00 GitLab Importer Fixing VCID-z9t9-bxf9-hkfk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25796.yml 38.0.0
2026-04-01T12:53:57.322927+00:00 GitLab Importer Fixing VCID-yx7r-r7ez-7uhp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Magick.NET-Q16-OpenMP-x86/CVE-2026-25797.yml 38.0.0
2026-04-01T12:53:57.011382+00:00 GithubOSV Importer Fixing VCID-y4hn-6bv6-jugw https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-3mwp-xqp2-q6ph/GHSA-3mwp-xqp2-q6ph.json 38.0.0
2026-04-01T12:53:55.038627+00:00 GithubOSV Importer Fixing VCID-vpdn-g1k9-1kdn https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-mqfc-82jx-3mr2/GHSA-mqfc-82jx-3mr2.json 38.0.0
2026-04-01T12:53:36.096550+00:00 GithubOSV Importer Fixing VCID-sdc2-fcap-abaz https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-pmq6-8289-hx3v/GHSA-pmq6-8289-hx3v.json 38.0.0
2026-04-01T12:53:11.428213+00:00 GithubOSV Importer Fixing VCID-pcme-bwan-3bcf https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-p863-5fgm-rgq4/GHSA-p863-5fgm-rgq4.json 38.0.0
2026-04-01T12:53:10.205733+00:00 GithubOSV Importer Fixing VCID-yx7r-r7ez-7uhp https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-rw6c-xp26-225v/GHSA-rw6c-xp26-225v.json 38.0.0
2026-04-01T12:53:09.147945+00:00 GithubOSV Importer Fixing VCID-anyp-2jr7-73a1 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-2gq3-ww97-wfjm/GHSA-2gq3-ww97-wfjm.json 38.0.0
2026-04-01T12:53:07.680037+00:00 GithubOSV Importer Fixing VCID-dtza-65ku-aber https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-p33r-fqw2-rqmm/GHSA-p33r-fqw2-rqmm.json 38.0.0
2026-04-01T12:53:07.137482+00:00 GithubOSV Importer Fixing VCID-29r3-kvf4-n3hc https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-qpgx-jfcq-r59f/GHSA-qpgx-jfcq-r59f.json 38.0.0
2026-04-01T12:53:06.362337+00:00 GithubOSV Importer Fixing VCID-mntx-6yku-3qcx https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-xpg8-7m6m-jf56/GHSA-xpg8-7m6m-jf56.json 38.0.0
2026-04-01T12:53:05.512842+00:00 GithubOSV Importer Fixing VCID-15ny-qqbj-qyfk https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-v994-63cg-9wj3/GHSA-v994-63cg-9wj3.json 38.0.0
2026-04-01T12:53:04.322972+00:00 GithubOSV Importer Fixing VCID-b5pd-kk97-gban https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-wg3g-gvx5-2pmv/GHSA-wg3g-gvx5-2pmv.json 38.0.0
2026-04-01T12:53:03.773829+00:00 GithubOSV Importer Fixing VCID-zx14-t8et-ufcq https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-3q5f-gmjc-38r8/GHSA-3q5f-gmjc-38r8.json 38.0.0
2026-04-01T12:53:02.909930+00:00 GithubOSV Importer Fixing VCID-f1zu-xb4j-8qhp https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-42p5-62qq-mmh7/GHSA-42p5-62qq-mmh7.json 38.0.0
2026-04-01T12:53:02.211283+00:00 GithubOSV Importer Fixing VCID-p5aw-n691-nkff https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-782x-jh29-9mf7/GHSA-782x-jh29-9mf7.json 38.0.0
2026-04-01T12:53:01.672598+00:00 GithubOSV Importer Fixing VCID-62ar-kwbq-nyh3 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-gxcx-qjqp-8vjw/GHSA-gxcx-qjqp-8vjw.json 38.0.0
2026-04-01T12:53:00.500224+00:00 GithubOSV Importer Fixing VCID-kefv-kpkk-wudf https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-543g-8grm-9cw6/GHSA-543g-8grm-9cw6.json 38.0.0
2026-04-01T12:52:59.598335+00:00 GithubOSV Importer Fixing VCID-69f6-ceje-hyah https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-wgxp-q8xq-wpp9/GHSA-wgxp-q8xq-wpp9.json 38.0.0
2026-04-01T12:52:58.729174+00:00 GithubOSV Importer Fixing VCID-sd54-b8z1-2fg7 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-7355-pwx2-pm84/GHSA-7355-pwx2-pm84.json 38.0.0
2026-04-01T12:52:55.405088+00:00 GithubOSV Importer Fixing VCID-zab9-9tqj-hbhg https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-v7g2-m8c5-mf84/GHSA-v7g2-m8c5-mf84.json 38.0.0
2026-04-01T12:52:54.853084+00:00 GithubOSV Importer Fixing VCID-z9t9-bxf9-hkfk https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-g2pr-qxjg-7r2w/GHSA-g2pr-qxjg-7r2w.json 38.0.0
2026-04-01T12:52:53.509148+00:00 GithubOSV Importer Fixing VCID-fnck-7mvx-hqc9 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-r99p-5442-q2x2/GHSA-r99p-5442-q2x2.json 38.0.0
2026-04-01T12:52:51.551948+00:00 GithubOSV Importer Fixing VCID-jcjk-s89c-mbbm https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-w8mw-frc6-r7m8/GHSA-w8mw-frc6-r7m8.json 38.0.0
2026-04-01T12:52:50.130796+00:00 GithubOSV Importer Fixing VCID-emmr-15qp-vfah https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-vpxv-r9pg-7gpr/GHSA-vpxv-r9pg-7gpr.json 38.0.0
2026-04-01T12:52:48.849060+00:00 GithubOSV Importer Fixing VCID-kdw5-8y5z-zya5 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-gm37-qx7w-p258/GHSA-gm37-qx7w-p258.json 38.0.0
2026-04-01T12:52:47.574685+00:00 GithubOSV Importer Fixing VCID-xbsu-ac6g-53fn https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-vhqj-f5cj-9x8h/GHSA-vhqj-f5cj-9x8h.json 38.0.0
2026-04-01T12:52:46.790675+00:00 GithubOSV Importer Fixing VCID-uvpj-a8v5-ebgz https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-xgm3-v4r9-wfgm/GHSA-xgm3-v4r9-wfgm.json 38.0.0
2026-04-01T12:52:45.948830+00:00 GithubOSV Importer Fixing VCID-5uyd-bv33-h7g1 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-6j5f-24fw-pqp4/GHSA-6j5f-24fw-pqp4.json 38.0.0
2026-04-01T12:52:44.830932+00:00 GithubOSV Importer Fixing VCID-gdg8-aejn-83c4 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-8jvj-p28h-9gm7/GHSA-8jvj-p28h-9gm7.json 38.0.0
2026-04-01T12:52:43.576400+00:00 GithubOSV Importer Fixing VCID-cbqr-aybx-d3e6 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-fwqw-2x5x-w566/GHSA-fwqw-2x5x-w566.json 38.0.0
2026-04-01T12:52:42.502774+00:00 GithubOSV Importer Fixing VCID-bd1g-sfsp-37h7 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-72hf-fj62-w6j4/GHSA-72hf-fj62-w6j4.json 38.0.0
2026-04-01T12:52:41.760858+00:00 GithubOSV Importer Fixing VCID-6ztv-auh8-27gx https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-wfx3-6g53-9fgc/GHSA-wfx3-6g53-9fgc.json 38.0.0
2026-04-01T12:52:41.431055+00:00 GithubOSV Importer Fixing VCID-d8yf-8rff-3yhf https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-gwr3-x37h-h84v/GHSA-gwr3-x37h-h84v.json 38.0.0
2026-04-01T12:52:41.076105+00:00 GithubOSV Importer Fixing VCID-x44m-x33k-hydn https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-gq5v-qf8q-fp77/GHSA-gq5v-qf8q-fp77.json 38.0.0
2026-04-01T12:52:39.584140+00:00 GithubOSV Importer Fixing VCID-6rma-wjdv-uqe9 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-3j4x-rwrx-xxj9/GHSA-3j4x-rwrx-xxj9.json 38.0.0
2026-04-01T12:52:38.546736+00:00 GithubOSV Importer Fixing VCID-ruf5-255v-sfdb https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-jv4p-gjwq-9r2j/GHSA-jv4p-gjwq-9r2j.json 38.0.0
2026-04-01T12:52:35.724119+00:00 GithubOSV Importer Fixing VCID-5xqd-gf3b-4ygw https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-xwc6-v6g8-pw2h/GHSA-xwc6-v6g8-pw2h.json 38.0.0
2026-04-01T12:52:32.987266+00:00 GithubOSV Importer Fixing VCID-jvq6-xjbu-fkb9 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-pqgj-2p96-rx85/GHSA-pqgj-2p96-rx85.json 38.0.0
2026-04-01T12:52:32.447640+00:00 GithubOSV Importer Fixing VCID-sd7w-6qv5-73ge https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-273h-m46v-96q4/GHSA-273h-m46v-96q4.json 38.0.0