{"url":"http://public2.vulnerablecode.io/api/packages/130025?format=json","purl":"pkg:rpm/redhat/ImageMagick@6.0.7.1-16.0?arch=3","type":"rpm","namespace":"redhat","name":"ImageMagick","version":"6.0.7.1-16.0","qualifiers":{"arch":"3"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88927?format=json","vulnerability_id":"VCID-39mw-qs6j-83eu","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2440.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2440.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2440","reference_id":"","reference_type":"","scores":[{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.82843","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.82859","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.82872","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.82868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.82893","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.829","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.82916","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.82911","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.82908","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.82947","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.8295","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.8297","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.8298","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.82984","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0183","scoring_system":"epss","scoring_elements":"0.83007","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2440"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618102","reference_id":"1618102","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618102"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=345595","reference_id":"345595","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=345595"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0015","reference_id":"RHSA-2007:0015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0015"}],"fixed_packages":[],"aliases":["CVE-2006-2440"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-39mw-qs6j-83eu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41694?format=json","vulnerability_id":"VCID-8b34-juwg-pkcb","summary":"GraphicsMagick improperly handles PALM and DCM images, potentially\n    resulting in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5456.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5456.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-5456","reference_id":"","reference_type":"","scores":[{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.74847","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.74848","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.74877","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.7485","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.74883","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.74896","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.7492","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.74898","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.74888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.74925","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.74932","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.74924","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.7496","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.74966","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.74969","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00851","scoring_system":"epss","scoring_elements":"0.74976","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-5456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=210921","reference_id":"210921","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=210921"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=393025","reference_id":"393025","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=393025"},{"reference_url":"https://security.gentoo.org/glsa/200611-07","reference_id":"GLSA-200611-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200611-07"},{"reference_url":"https://security.gentoo.org/glsa/200611-19","reference_id":"GLSA-200611-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200611-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0015","reference_id":"RHSA-2007:0015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0015"},{"reference_url":"https://usn.ubuntu.com/372-1/","reference_id":"USN-372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/372-1/"},{"reference_url":"https://usn.ubuntu.com/422-1/","reference_id":"USN-422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/422-1/"}],"fixed_packages":[],"aliases":["CVE-2006-5456"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8b34-juwg-pkcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88814?format=json","vulnerability_id":"VCID-j1hu-4c4d-ske6","summary":"Insufficient boundary check in ImageMagick's SGIDecode()","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5868.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-5868","reference_id":"","reference_type":"","scores":[{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80931","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80777","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80787","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80805","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80832","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80841","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80857","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80842","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80835","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80872","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80874","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80896","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80903","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01459","scoring_system":"epss","scoring_elements":"0.80915","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-5868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5868"},{"reference_url":"http://secunia.com/advisories/22998","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22998"},{"reference_url":"http://secunia.com/advisories/23101","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23101"},{"reference_url":"http://secunia.com/advisories/23219","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23219"},{"reference_url":"http://secunia.com/advisories/24186","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24186"},{"reference_url":"http://secunia.com/advisories/24284","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24284"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10612","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10612"},{"reference_url":"http://www.debian.org/security/2006/dsa-1213","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-1213"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:223","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:223"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0015.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0015.html"},{"reference_url":"http://www.securityfocus.com/bid/21185","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/21185"},{"reference_url":"http://www.ubuntu.com/usn/usn-386-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-386-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=217560","reference_id":"217560","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=217560"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-5868","reference_id":"CVE-2006-5868","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-5868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0015","reference_id":"RHSA-2007:0015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0015"},{"reference_url":"https://usn.ubuntu.com/386-1/","reference_id":"USN-386-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/386-1/"}],"fixed_packages":[],"aliases":["CVE-2006-5868"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j1hu-4c4d-ske6"}],"fixing_vulnerabilities":[],"risk_score":"4.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ImageMagick@6.0.7.1-16.0%3Farch=3"}