Register Login
  • more
    • SaaS Solutions
      • Vulnerability Intelligence
      • Vulnerability Management
    • Pricing
    • Vulnerabilities
    • Reports
    • Blog
    • Contact Us
  1. Main
  2. Vulnerability Database
  3. Canonical Ltd.
  4. libmagickcore-6-arch-config (Ubuntu package)

Known Vulnerabilities in libmagickcore-6-arch-config (Ubuntu package)

Show more ↓
Ubuntu Pro (Infra-only)
8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
8:6.9.10.23+dfsg-2.1ubuntu3.1
8:6.9.10.23+dfsg-2.1ubuntu3
8:6.9.10.14+dfsg-7ubuntu2.3
8:6.9.10.14+dfsg-7ubuntu2.2
8:6.9.10.8+dfsg-1ubuntu2.2
8:6.9.7.4+dfsg-16ubuntu6.15
8:6.9.7.4+dfsg-16ubuntu6.14
8:6.9.7.4+dfsg-16ubuntu6.13
8:6.9.7.4+dfsg-16ubuntu6.12
8:6.9.7.4+dfsg-16ubuntu6.11
8:6.9.7.4+dfsg-16ubuntu6.9
8:6.9.7.4+dfsg-16ubuntu6.8
8:6.9.7.4+dfsg-16ubuntu6.7
8:6.8.9.97ubuntu5.16+esm2
8:6.8.9.9-7ubuntu5.16
8:6.8.9.9-7ubuntu5.15
8:6.8.9.9-7ubuntu5.14
6.9.10.23+dfsg-2.1ubuntu11
6.9.10.23+dfsg-2.1ubuntu3.1
6.9.10.23+dfsg-2.1ubuntu3
6.9.7.4+dfsg-16ubuntu6.8
6.9.7.4+dfsg-16ubuntu6
6.8.9.9-7ubuntu5.15
6.8.9.9-7ubuntu5



Ubuntu update for imagemagick24 Nov, 2022
High Patched
Ubuntu update for imagemagick23 Mar, 2022
High Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • AI voice impersonator posed as US Secretary of State Marco Rubio to contact foreign ministers
  • DoNot APT targets European foreign affairs ministry in espionage campaign
  • Microsoft fixes over 130 flaws, no actively exploited zero-days
  • US sanctions North Korean cyber actor for orchestrating IT Worker scheme abroad
  • Hackers abuse Shellter Elite after software leak, vendor confirms
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.