Language:
http://www.nessus.org/u?9affa1bb
https://security-tracker.debian.org/tracker/CVE-2026-28493
https://security-tracker.debian.org/tracker/CVE-2026-28494
https://security-tracker.debian.org/tracker/CVE-2026-28686
https://security-tracker.debian.org/tracker/CVE-2026-28687
https://security-tracker.debian.org/tracker/CVE-2026-28688
https://security-tracker.debian.org/tracker/CVE-2026-28689
https://security-tracker.debian.org/tracker/CVE-2026-28690
https://security-tracker.debian.org/tracker/CVE-2026-28691
https://security-tracker.debian.org/tracker/CVE-2026-28692
https://security-tracker.debian.org/tracker/CVE-2026-28693
https://security-tracker.debian.org/tracker/CVE-2026-30883
https://security-tracker.debian.org/tracker/CVE-2026-30929
https://security-tracker.debian.org/tracker/CVE-2026-30931
https://security-tracker.debian.org/tracker/CVE-2026-30935
https://security-tracker.debian.org/tracker/CVE-2026-30936
https://security-tracker.debian.org/tracker/CVE-2026-30937
https://security-tracker.debian.org/tracker/CVE-2026-31853
Severity: High
ID: 303080
File Name: debian_DSA-6169.nasl
Version: 1.1
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 3/19/2026
Updated: 3/19/2026
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: High
Score: 7.0
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2026-30931
Risk Factor: High
Base Score: 7.8
Temporal Score: 6.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:libmagickcore-7.q16-10, p-cpe:/a:debian:debian_linux:libmagick%2b%2b-7.q16hdri-5, p-cpe:/a:debian:debian_linux:libmagickcore-7.q16hdri-10-extra, p-cpe:/a:debian:debian_linux:libmagickwand-7.q16hdri-10, p-cpe:/a:debian:debian_linux:libmagick%2b%2b-7.q16hdri-dev, p-cpe:/a:debian:debian_linux:libmagick%2b%2b-7.q16-5, p-cpe:/a:debian:debian_linux:libmagick%2b%2b-dev, p-cpe:/a:debian:debian_linux:imagemagick-7-doc, p-cpe:/a:debian:debian_linux:libmagickcore-7-headers, p-cpe:/a:debian:debian_linux:libmagickcore-dev, p-cpe:/a:debian:debian_linux:perlmagick, p-cpe:/a:debian:debian_linux:libmagick%2b%2b-7-headers, p-cpe:/a:debian:debian_linux:libmagickwand-7.q16hdri-dev, p-cpe:/a:debian:debian_linux:imagemagick, p-cpe:/a:debian:debian_linux:libimage-magick-q16-perl, p-cpe:/a:debian:debian_linux:imagemagick-7.q16hdri, p-cpe:/a:debian:debian_linux:imagemagick-7.q16, p-cpe:/a:debian:debian_linux:libmagickwand-7-headers, p-cpe:/a:debian:debian_linux:libmagickwand-dev, p-cpe:/a:debian:debian_linux:libmagickwand-7.q16-10, cpe:/o:debian:debian_linux:13.0, p-cpe:/a:debian:debian_linux:libmagickcore-7.q16hdri-10, p-cpe:/a:debian:debian_linux:libmagick%2b%2b-7.q16-dev, p-cpe:/a:debian:debian_linux:libimage-magick-q16hdri-perl, p-cpe:/a:debian:debian_linux:imagemagick-7-common, p-cpe:/a:debian:debian_linux:libmagickcore-7.q16hdri-dev, p-cpe:/a:debian:debian_linux:libimage-magick-perl, p-cpe:/a:debian:debian_linux:libmagickcore-7.q16-dev, p-cpe:/a:debian:debian_linux:libmagickcore-7.q16-10-extra, p-cpe:/a:debian:debian_linux:libmagickwand-7.q16-dev, p-cpe:/a:debian:debian_linux:libmagickcore-7-arch-config
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: No known exploits are available
Patch Publication Date: 3/19/2026
Vulnerability Publication Date: 3/9/2026
CVE: CVE-2026-28493, CVE-2026-28494, CVE-2026-28686, CVE-2026-28687, CVE-2026-28688, CVE-2026-28689, CVE-2026-28690, CVE-2026-28691, CVE-2026-28692, CVE-2026-28693, CVE-2026-30883, CVE-2026-30929, CVE-2026-30931, CVE-2026-30935, CVE-2026-30936, CVE-2026-30937, CVE-2026-31853, CVE-2026-32259
IAVB: 2026-B-0067