{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","type":"ebuild","namespace":"media-gfx","name":"imagemagick","version":"6.9.9.20","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"6.9.11.41-r1","latest_non_vulnerable_version":"7.1.1.22","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48177?format=json","vulnerability_id":"VCID-1x18-b9sa-yygh","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12692.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12692.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12692","reference_id":"","reference_type":"","scores":[{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76394","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76397","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76426","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76408","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.7644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76479","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76458","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76452","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76492","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76497","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76484","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76518","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76525","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76537","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76554","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76572","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.7656","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76577","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00958","scoring_system":"epss","scoring_elements":"0.76627","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12692"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488449","reference_id":"1488449","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488449"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875339","reference_id":"875339","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875339"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-12692"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1x18-b9sa-yygh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48191?format=json","vulnerability_id":"VCID-2a2h-yk41-qybt","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13134.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13134.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13134","reference_id":"","reference_type":"","scores":[{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73825","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73653","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73697","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73707","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.7373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73739","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.7374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73732","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73758","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73781","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73745","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73767","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73662","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01351","scoring_system":"epss","scoring_elements":"0.80051","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01351","scoring_system":"epss","scoring_elements":"0.80068","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01351","scoring_system":"epss","scoring_elements":"0.80096","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01351","scoring_system":"epss","scoring_elements":"0.80104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01351","scoring_system":"epss","scoring_elements":"0.80123","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01351","scoring_system":"epss","scoring_elements":"0.80058","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01351","scoring_system":"epss","scoring_elements":"0.80079","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486779","reference_id":"1486779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486779"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873099","reference_id":"873099","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873099"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881524","reference_id":"881524","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881524"},{"reference_url":"https://security.archlinux.org/ASA-201801-7","reference_id":"ASA-201801-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-7"},{"reference_url":"https://security.archlinux.org/AVG-355","reference_id":"AVG-355","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-355"},{"reference_url":"https://security.archlinux.org/AVG-497","reference_id":"AVG-497","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-497"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"},{"reference_url":"https://usn.ubuntu.com/4222-1/","reference_id":"USN-4222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4222-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13134"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2a2h-yk41-qybt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48192?format=json","vulnerability_id":"VCID-2fzg-6h13-s7bk","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13139.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13139.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13139","reference_id":"","reference_type":"","scores":[{"value":"0.01149","scoring_system":"epss","scoring_elements":"0.78428","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01149","scoring_system":"epss","scoring_elements":"0.78506","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01149","scoring_system":"epss","scoring_elements":"0.78434","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01149","scoring_system":"epss","scoring_elements":"0.78465","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01149","scoring_system":"epss","scoring_elements":"0.78448","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01149","scoring_system":"epss","scoring_elements":"0.7848","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01149","scoring_system":"epss","scoring_elements":"0.78475","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80513","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80441","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.8046","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80455","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80471","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80346","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80348","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80353","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80379","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80386","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80403","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80419","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81108","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486784","reference_id":"1486784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486784"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870109","reference_id":"870109","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870109"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13139"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2fzg-6h13-s7bk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48183?format=json","vulnerability_id":"VCID-2pwb-71f5-8ken","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13058.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13058.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13058","reference_id":"","reference_type":"","scores":[{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63893","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64146","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64067","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64093","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6394","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64007","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64005","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63975","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64009","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64022","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6401","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64029","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64042","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6404","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64054","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.641","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13058"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487258","reference_id":"1487258","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487258"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13058"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2pwb-71f5-8ken"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48202?format=json","vulnerability_id":"VCID-38vp-3yf8-aue8","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13769.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13769.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13769","reference_id":"","reference_type":"","scores":[{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67194","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67434","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67349","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67373","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67231","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67255","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67232","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67283","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67296","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67316","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67303","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67267","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67294","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67314","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67325","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67326","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67299","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67339","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67377","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487714","reference_id":"1487714","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487714"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878507","reference_id":"878507","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878507"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13769"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-38vp-3yf8-aue8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48197?format=json","vulnerability_id":"VCID-3dsm-e7ye-wqe1","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13144.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13144.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13144","reference_id":"","reference_type":"","scores":[{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4745","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47505","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47403","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47432","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47481","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47502","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47451","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47506","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47503","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47525","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47501","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47509","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47568","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47561","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47504","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47511","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47376","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47442","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47461","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486802","reference_id":"1486802","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486802"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869728","reference_id":"869728","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869728"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"},{"reference_url":"https://usn.ubuntu.com/5335-1/","reference_id":"USN-5335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5335-1/"},{"reference_url":"https://usn.ubuntu.com/6980-1/","reference_id":"USN-6980-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6980-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13144"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3dsm-e7ye-wqe1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48201?format=json","vulnerability_id":"VCID-5114-9n17-pkd1","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13768.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13768.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13768","reference_id":"","reference_type":"","scores":[{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75281","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75522","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75459","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75467","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75285","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75317","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75295","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75338","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75369","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75347","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75336","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75376","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75382","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75373","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75408","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75412","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75424","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75454","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.75479","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13768"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487679","reference_id":"1487679","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487679"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875352","reference_id":"875352","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875352"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13768"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5114-9n17-pkd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48181?format=json","vulnerability_id":"VCID-6d5n-tv5h-xkhj","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12877.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12877.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12877","reference_id":"","reference_type":"","scores":[{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78788","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.79016","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.7896","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78977","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78826","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78808","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78834","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.7884","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78863","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78847","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78837","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78865","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.7886","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78888","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78895","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78911","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78928","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78949","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78963","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12877"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17879"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487118","reference_id":"1487118","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487118"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872373","reference_id":"872373","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872373"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-12877"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6d5n-tv5h-xkhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48203?format=json","vulnerability_id":"VCID-6jnv-nnkm-v7a3","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14060.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14060.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14060","reference_id":"","reference_type":"","scores":[{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48517","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48586","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48479","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48508","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48552","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48576","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48528","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48582","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48578","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48599","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48572","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48585","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48635","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48631","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48588","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48573","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48584","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48532","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48448","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48509","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48535","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14060"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488979","reference_id":"1488979","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488979"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878506","reference_id":"878506","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878506"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-14060"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6jnv-nnkm-v7a3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48171?format=json","vulnerability_id":"VCID-7dqc-1d5h-uybs","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11724.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11724.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11724","reference_id":"","reference_type":"","scores":[{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64048","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64302","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64224","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.6425","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64105","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64132","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64142","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64158","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.6417","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64131","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64167","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64178","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64166","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64186","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64199","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64168","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64212","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64257","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11724"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477058","reference_id":"1477058","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477058"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870023","reference_id":"870023","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870023"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-11724"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7dqc-1d5h-uybs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48214?format=json","vulnerability_id":"VCID-8v7y-kcz2-bbb9","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15281.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15281.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15281","reference_id":"","reference_type":"","scores":[{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69139","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.6939","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69317","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69351","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.6932","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69344","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69155","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69176","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69225","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69233","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69204","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69252","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69232","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69291","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69298","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69275","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15281"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/ImageMagick/ImageMagick/issues/832","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/ImageMagick/ImageMagick/issues/832"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html"},{"reference_url":"http://www.securityfocus.com/bid/101276","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101276"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1510427","reference_id":"1510427","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1510427"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878579","reference_id":"878579","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878579"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.7-6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:imagemagick:imagemagick:7.0.7-6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.7-6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15281","reference_id":"CVE-2017-15281","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15281"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-15281"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8v7y-kcz2-bbb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48195?format=json","vulnerability_id":"VCID-9z34-j85g-9kej","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13142.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13142.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13142","reference_id":"","reference_type":"","scores":[{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55913","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.5607","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55989","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56012","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56046","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56024","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56075","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56079","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.5609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56067","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.5605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56059","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55986","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56006","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55981","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55931","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55978","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.5604","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486795","reference_id":"1486795","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486795"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870105","reference_id":"870105","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870105"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13142"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9z34-j85g-9kej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48211?format=json","vulnerability_id":"VCID-bf7n-dsx6-rqa2","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14224.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14224.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14224","reference_id":"","reference_type":"","scores":[{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77354","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77449","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.7755","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77538","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77557","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77361","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77388","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77368","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77398","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77407","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77434","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77413","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.7741","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77448","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.7744","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77474","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.7748","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77493","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.775","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77527","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78143","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546"},{"reference_url":"https://github.com/ImageMagick/ImageMagick/issues/733","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/ImageMagick/ImageMagick/issues/733"},{"reference_url":"https://www.debian.org/security/2017/dsa-4032","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4032"},{"reference_url":"https://www.debian.org/security/2017/dsa-4040","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4040"},{"reference_url":"http://www.securityfocus.com/bid/100702","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/100702"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1491251","reference_id":"1491251","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1491251"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876097","reference_id":"876097","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876097"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.6-8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:imagemagick:imagemagick:7.0.6-8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.6-8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14224","reference_id":"CVE-2017-14224","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14224"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-14224"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bf7n-dsx6-rqa2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48172?format=json","vulnerability_id":"VCID-cwez-6cgj-17gz","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12140.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12140.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12140","reference_id":"","reference_type":"","scores":[{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76345","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.7621","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.7622","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76232","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76242","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76271","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76293","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.7628","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76295","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76169","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76145","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76183","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.76187","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00934","scoring_system":"epss","scoring_elements":"0.7617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76376","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.7638","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76409","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.7639","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79291","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79301","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12140"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477565","reference_id":"1477565","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477565"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873059","reference_id":"873059","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873059"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-12140"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cwez-6cgj-17gz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48187?format=json","vulnerability_id":"VCID-dsee-yrq9-cuca","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13062.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13062.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13062","reference_id":"","reference_type":"","scores":[{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63893","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64146","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64067","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64093","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6394","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64007","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64005","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63975","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64009","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64022","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6401","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64029","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64042","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6404","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64054","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.641","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487263","reference_id":"1487263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487263"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13062"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dsee-yrq9-cuca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48190?format=json","vulnerability_id":"VCID-eeah-xwrp-f3b5","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13133.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13133","reference_id":"","reference_type":"","scores":[{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63342","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63596","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63518","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63545","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63402","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63429","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63395","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63446","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63464","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63481","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63465","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.6343","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63463","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.6347","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63456","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63474","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63483","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.635","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63553","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13133"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486778","reference_id":"1486778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486778"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873100","reference_id":"873100","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873100"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13133"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eeah-xwrp-f3b5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48204?format=json","vulnerability_id":"VCID-ep6g-44qy-5qd7","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14137.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14137.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14137","reference_id":"","reference_type":"","scores":[{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49016","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49103","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49028","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49086","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49083","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.491","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49073","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.4908","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49125","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49091","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49077","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49043","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.48961","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49025","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49053","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14137"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14137"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488436","reference_id":"1488436","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488436"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-14137"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ep6g-44qy-5qd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48205?format=json","vulnerability_id":"VCID-f9z9-h8bt-9bg7","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14138.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14138.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14138","reference_id":"","reference_type":"","scores":[{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.44992","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.44972","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.44867","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.44936","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.44953","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.44894","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.44919","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54726","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54735","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54719","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54697","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54718","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.5469","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54709","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54612","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54674","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54722","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54682","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54704","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14138"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488438","reference_id":"1488438","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488438"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-14138"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f9z9-h8bt-9bg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48175?format=json","vulnerability_id":"VCID-fbta-m4mx-jfap","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12691.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12691.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12691","reference_id":"","reference_type":"","scores":[{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76333","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76337","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76367","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76379","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76418","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76396","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76391","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76431","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76437","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76421","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76455","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76462","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76475","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76491","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.7651","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76498","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76514","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76564","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12691"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488450","reference_id":"1488450","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488450"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875338","reference_id":"875338","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875338"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-12691"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fbta-m4mx-jfap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48194?format=json","vulnerability_id":"VCID-fds9-yfxw-gqgs","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13141.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13141.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13141","reference_id":"","reference_type":"","scores":[{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62156","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62407","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62373","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62353","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62243","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62209","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62295","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62285","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62263","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62308","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62315","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.623","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62309","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62326","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6232","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62266","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486793","reference_id":"1486793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486793"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870116","reference_id":"870116","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870116"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13141"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fds9-yfxw-gqgs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48180?format=json","vulnerability_id":"VCID-fx9z-gbbd-q7aq","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12876.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12876.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12876","reference_id":"","reference_type":"","scores":[{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.65071","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64993","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.65014","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.6486","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64887","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.6485","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.649","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64915","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64932","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64922","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64894","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.6493","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64941","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64925","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64958","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64953","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64933","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64981","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.65024","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12876"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487115","reference_id":"1487115","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487115"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-12876"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fx9z-gbbd-q7aq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48186?format=json","vulnerability_id":"VCID-g6sp-5zkq-dkf9","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13061.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13061.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13061","reference_id":"","reference_type":"","scores":[{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.6431","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64572","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64495","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64519","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64364","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64393","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64353","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64429","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64388","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64423","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64434","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64427","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64448","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64461","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64432","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64479","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64525","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13061"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487262","reference_id":"1487262","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487262"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873131","reference_id":"873131","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873131"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13061"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g6sp-5zkq-dkf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48198?format=json","vulnerability_id":"VCID-gq8m-6nq9-4bcq","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13145.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13145.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13145","reference_id":"","reference_type":"","scores":[{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79892","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80125","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80068","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80084","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79899","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.7992","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79936","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79965","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.7994","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79968","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79972","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.8","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80005","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80033","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80057","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80071","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486804","reference_id":"1486804","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486804"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869830","reference_id":"869830","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869830"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13145"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gq8m-6nq9-4bcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48193?format=json","vulnerability_id":"VCID-gqky-zdxn-e3gd","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13140.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13140.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13140","reference_id":"","reference_type":"","scores":[{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61425","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61501","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6153","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.615","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61563","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61583","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6157","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6155","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61592","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61597","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61582","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61572","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61587","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61529","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61637","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61598","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61626","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6168","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486792","reference_id":"1486792","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486792"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870111","reference_id":"870111","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870111"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13140"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gqky-zdxn-e3gd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48169?format=json","vulnerability_id":"VCID-hcxd-bker-sqc1","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11640.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11640","reference_id":"","reference_type":"","scores":[{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59283","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59161","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.5918","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59165","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59123","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59171","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59228","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59184","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59212","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59193","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59176","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59157","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59197","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68624","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.6869","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68643","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68661","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68638","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475463","reference_id":"1475463","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475463"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870067","reference_id":"870067","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870067"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-11640"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hcxd-bker-sqc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48184?format=json","vulnerability_id":"VCID-j1jt-g5m8-ffbh","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13059.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13059.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13059","reference_id":"","reference_type":"","scores":[{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63893","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64146","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64067","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64093","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6394","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64007","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64005","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63975","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64009","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64022","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6401","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64029","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64042","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6404","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64054","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.641","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487260","reference_id":"1487260","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487260"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13059"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j1jt-g5m8-ffbh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48189?format=json","vulnerability_id":"VCID-jxwd-tm1k-yqa2","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13132.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13132.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13132","reference_id":"","reference_type":"","scores":[{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48445","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48482","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48504","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48456","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48511","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48507","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48529","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48502","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48515","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48565","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.4856","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48517","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48458","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48436","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48461","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48406","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48435","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48512","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13132"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486776","reference_id":"1486776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486776"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13132"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jxwd-tm1k-yqa2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48174?format=json","vulnerability_id":"VCID-k1pr-h6c7-2fgp","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12427.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12427","reference_id":"","reference_type":"","scores":[{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69739","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69991","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69915","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69942","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69751","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69767","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69743","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69791","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69807","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.6983","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69842","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69852","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69833","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69884","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69897","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69872","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69916","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69946","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1482652","reference_id":"1482652","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1482652"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870525","reference_id":"870525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870525"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-12427"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k1pr-h6c7-2fgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48199?format=json","vulnerability_id":"VCID-k7ku-8uya-kbeu","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13146.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13146.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13146","reference_id":"","reference_type":"","scores":[{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64148","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64409","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64332","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64357","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64205","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64232","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64193","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64243","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64259","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64261","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64268","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64279","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64288","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64301","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64273","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64317","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64362","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13146"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486806","reference_id":"1486806","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013","reference_id":"870013","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870013"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13146"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k7ku-8uya-kbeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48173?format=json","vulnerability_id":"VCID-mws6-wym5-d3f6","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12418.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12418","reference_id":"","reference_type":"","scores":[{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46753","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46651","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46683","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46748","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46768","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46716","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.4677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46793","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46765","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46773","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46829","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46826","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46756","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46767","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46718","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46622","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46686","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46705","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1482625","reference_id":"1482625","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1482625"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872498","reference_id":"872498","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872498"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-12418"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mws6-wym5-d3f6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48206?format=json","vulnerability_id":"VCID-ngzz-mwp9-rkdv","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14139.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14139.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14139","reference_id":"","reference_type":"","scores":[{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48734","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48671","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.4859","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48652","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48679","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48625","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48656","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59334","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59318","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59333","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59339","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.5932","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59298","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59317","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59191","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59251","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59264","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59288","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14139"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488430","reference_id":"1488430","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488430"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-14139"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ngzz-mwp9-rkdv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48212?format=json","vulnerability_id":"VCID-ra5y-ag3h-5yb8","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14248.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14248.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14248","reference_id":"","reference_type":"","scores":[{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51427","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51585","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51423","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51473","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51517","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51476","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51505","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51465","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51518","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51516","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5156","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51539","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51527","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5157","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51579","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51558","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51512","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14248"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/ImageMagick/ImageMagick/issues/717","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/ImageMagick/ImageMagick/issues/717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1491254","reference_id":"1491254","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1491254"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.6-8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:imagemagick:imagemagick:7.0.6-8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.6-8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14248","reference_id":"CVE-2017-14248","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14248"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-14248"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ra5y-ag3h-5yb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48208?format=json","vulnerability_id":"VCID-rf1t-45cj-mue1","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14173.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14173.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14173","reference_id":"","reference_type":"","scores":[{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80375","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.8062","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80563","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.8058","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80381","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80402","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.8042","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.8043","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80448","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80434","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80427","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80456","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80457","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.8046","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80492","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80509","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80525","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80548","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80568","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14173"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14173","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14173"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489702","reference_id":"1489702","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489702"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875504","reference_id":"875504","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875504"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-14173"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rf1t-45cj-mue1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48213?format=json","vulnerability_id":"VCID-thbh-m54e-z7ca","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14249.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14249.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14249","reference_id":"","reference_type":"","scores":[{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69573","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69833","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69756","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69787","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69757","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69783","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69586","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69602","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.6958","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69631","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.6967","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69655","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69641","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69682","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.6969","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69672","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69724","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69732","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69712","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14249"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14249","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14249"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/ImageMagick/ImageMagick/issues/708","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/ImageMagick/ImageMagick/issues/708"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1491260","reference_id":"1491260","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1491260"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876099","reference_id":"876099","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876099"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.6-8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:imagemagick:imagemagick:7.0.6-8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.6-8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14249","reference_id":"CVE-2017-14249","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14249"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-14249"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-thbh-m54e-z7ca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48196?format=json","vulnerability_id":"VCID-tms4-1k6m-cqgd","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13143.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13143.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13143","reference_id":"","reference_type":"","scores":[{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54355","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54521","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54428","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54455","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54434","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54456","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54425","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54472","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54483","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54466","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54445","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54487","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54465","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54426","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.5444","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.5442","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.5437","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54413","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.5447","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5248"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486799","reference_id":"1486799","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486799"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870012","reference_id":"870012","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870012"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13143"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tms4-1k6m-cqgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48179?format=json","vulnerability_id":"VCID-v24g-h7t5-nbec","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12693.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12693.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12693","reference_id":"","reference_type":"","scores":[{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76279","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76283","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76314","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76293","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76326","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76366","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76344","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.7638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76385","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76403","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.7641","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76423","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76412","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76441","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76462","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.7645","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76465","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00947","scoring_system":"epss","scoring_elements":"0.76514","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12693","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12693"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488445","reference_id":"1488445","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488445"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875341","reference_id":"875341","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875341"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-12693"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v24g-h7t5-nbec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48200?format=json","vulnerability_id":"VCID-vzru-smr4-5kfk","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13758.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13758.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13758","reference_id":"","reference_type":"","scores":[{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77108","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77366","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77303","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.7732","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77115","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77126","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77158","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77167","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77194","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77174","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77169","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.7721","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77211","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77202","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77237","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77243","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77258","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77292","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77313","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487763","reference_id":"1487763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487763"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878508","reference_id":"878508","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878508"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13758"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vzru-smr4-5kfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48185?format=json","vulnerability_id":"VCID-wbx1-wdxc-k3bc","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13060.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13060.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13060","reference_id":"","reference_type":"","scores":[{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63893","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64146","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64067","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64093","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6394","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64007","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64005","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63975","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64009","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64022","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6401","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64029","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64042","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6404","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64054","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.641","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487261","reference_id":"1487261","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487261"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13060"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wbx1-wdxc-k3bc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48209?format=json","vulnerability_id":"VCID-x6sg-6k7v-9qd8","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14174.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14174.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14174","reference_id":"","reference_type":"","scores":[{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70632","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70896","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70815","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70843","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70647","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70666","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70689","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70705","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70728","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70711","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70742","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70749","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.7078","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.7079","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70773","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70813","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.7085","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14174"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489705","reference_id":"1489705","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489705"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875503","reference_id":"875503","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875503"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-14174"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x6sg-6k7v-9qd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48182?format=json","vulnerability_id":"VCID-xk7c-7f1m-sqe5","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12983.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12983.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12983","reference_id":"","reference_type":"","scores":[{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51232","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51219","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51165","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51173","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51135","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51074","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51126","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51168","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51125","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51156","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51208","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51194","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51241","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65184","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65287","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65305","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65234","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65259","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65225","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65275","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487238","reference_id":"1487238","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487238"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873134","reference_id":"873134","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873134"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-12983"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xk7c-7f1m-sqe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48207?format=json","vulnerability_id":"VCID-yqzg-rzp1-bbgm","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14172.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14172.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14172","reference_id":"","reference_type":"","scores":[{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68799","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.69059","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68982","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.69007","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68818","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68868","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68887","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.6891","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68895","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68866","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68952","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68957","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68937","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.6898","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.69015","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14172"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14172","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14172"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489700","reference_id":"1489700","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489700"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875506","reference_id":"875506","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875506"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-14172"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yqzg-rzp1-bbgm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48210?format=json","vulnerability_id":"VCID-zfw4-5zqw-huh7","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14175.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14175.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14175","reference_id":"","reference_type":"","scores":[{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68799","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.69059","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68982","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.69007","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68818","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68868","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68887","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.6891","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68895","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68866","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68952","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68957","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.68937","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.6898","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00579","scoring_system":"epss","scoring_elements":"0.69015","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14175"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489706","reference_id":"1489706","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489706"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875502","reference_id":"875502","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875502"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-14175"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zfw4-5zqw-huh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48188?format=json","vulnerability_id":"VCID-zyg9-ad7g-ayex","summary":"Multiple vulnerabilities have been found in ImageMagick, the worst\n    of which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13131.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13131.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13131","reference_id":"","reference_type":"","scores":[{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62156","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62407","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62373","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62353","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62243","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62209","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62295","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62285","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62263","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62308","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62315","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.623","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62309","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62326","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6232","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62266","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486770","reference_id":"1486770","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486770"},{"reference_url":"https://security.gentoo.org/glsa/201711-07","reference_id":"GLSA-201711-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-07"},{"reference_url":"https://usn.ubuntu.com/3681-1/","reference_id":"USN-3681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3681-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77422?format=json","purl":"pkg:ebuild/media-gfx/imagemagick@6.9.9.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}],"aliases":["CVE-2017-13131"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zyg9-ad7g-ayex"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/imagemagick@6.9.9.20"}