Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
Typedeb
Namespacedebian
Namegraphicsmagick
Version1.4+really1.3.35-1~deb10u2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.4+really1.3.36+hg16481-2+deb11u1
Latest_non_vulnerable_version1.4+really1.3.36+hg16481-2+deb11u1
Affected_by_vulnerabilities
0
url VCID-3tbg-j6gv-9ub8
vulnerability_id VCID-3tbg-j6gv-9ub8
summary Multiple vulnerabilities have been discovered in GraphicsMagick, the worst of which are fuzzing issues presumed to allow for arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1270
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15959
published_at 2026-04-01T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15881
published_at 2026-04-07T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15967
published_at 2026-04-08T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.1603
published_at 2026-04-09T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.16008
published_at 2026-04-11T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15969
published_at 2026-04-12T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15901
published_at 2026-04-13T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15826
published_at 2026-04-16T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15839
published_at 2026-04-18T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15885
published_at 2026-04-21T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.16023
published_at 2026-04-02T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.16085
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1270
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1270
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://sourceforge.net/p/graphicsmagick/bugs/664/
reference_id 664
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T14:58:47Z/
url https://sourceforge.net/p/graphicsmagick/bugs/664/
4
reference_url https://www.debian.org/security/2022/dsa-5288
reference_id dsa-5288
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T14:58:47Z/
url https://www.debian.org/security/2022/dsa-5288
5
reference_url https://security.gentoo.org/glsa/202209-19
reference_id GLSA-202209-19
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T14:58:47Z/
url https://security.gentoo.org/glsa/202209-19
6
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T14:58:47Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00028.html
7
reference_url https://usn.ubuntu.com/5974-1/
reference_id USN-5974-1
reference_type
scores
url https://usn.ubuntu.com/5974-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1
aliases CVE-2022-1270
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3tbg-j6gv-9ub8
1
url VCID-uvjy-tccq-bkhb
vulnerability_id VCID-uvjy-tccq-bkhb
summary Multiple vulnerabilities have been discovered in GraphicsMagick, the worst of which are fuzzing issues presumed to allow for arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12672
reference_id
reference_type
scores
0
value 0.02691
scoring_system epss
scoring_elements 0.85793
published_at 2026-04-01T12:55:00Z
1
value 0.02691
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-02T12:55:00Z
2
value 0.02691
scoring_system epss
scoring_elements 0.85823
published_at 2026-04-04T12:55:00Z
3
value 0.02691
scoring_system epss
scoring_elements 0.85827
published_at 2026-04-07T12:55:00Z
4
value 0.02691
scoring_system epss
scoring_elements 0.85846
published_at 2026-04-08T12:55:00Z
5
value 0.02691
scoring_system epss
scoring_elements 0.85856
published_at 2026-04-09T12:55:00Z
6
value 0.02691
scoring_system epss
scoring_elements 0.85871
published_at 2026-04-11T12:55:00Z
7
value 0.02691
scoring_system epss
scoring_elements 0.85868
published_at 2026-04-12T12:55:00Z
8
value 0.02691
scoring_system epss
scoring_elements 0.85864
published_at 2026-04-13T12:55:00Z
9
value 0.02691
scoring_system epss
scoring_elements 0.85882
published_at 2026-04-16T12:55:00Z
10
value 0.02691
scoring_system epss
scoring_elements 0.85887
published_at 2026-04-18T12:55:00Z
11
value 0.02691
scoring_system epss
scoring_elements 0.85879
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12672
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12672
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960000
reference_id 960000
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960000
3
reference_url https://security.gentoo.org/glsa/202209-19
reference_id GLSA-202209-19
reference_type
scores
url https://security.gentoo.org/glsa/202209-19
4
reference_url https://usn.ubuntu.com/5974-1/
reference_id USN-5974-1
reference_type
scores
url https://usn.ubuntu.com/5974-1/
5
reference_url https://usn.ubuntu.com/USN-5190-1/
reference_id USN-USN-5190-1
reference_type
scores
url https://usn.ubuntu.com/USN-5190-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.36%2Bhg16481-2%2Bdeb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.36%252Bhg16481-2%252Bdeb11u1
aliases CVE-2020-12672
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uvjy-tccq-bkhb
Fixing_vulnerabilities
0
url VCID-15mv-khzp-fqfk
vulnerability_id VCID-15mv-khzp-fqfk
summary ImageMagick: memory leak in WriteMSLImage of coders/msl.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18544.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18544.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18544
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35516
published_at 2026-04-01T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35718
published_at 2026-04-02T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35743
published_at 2026-04-04T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35624
published_at 2026-04-07T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.3567
published_at 2026-04-08T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35693
published_at 2026-04-09T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35703
published_at 2026-04-11T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35658
published_at 2026-04-12T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35636
published_at 2026-04-13T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35675
published_at 2026-04-16T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35665
published_at 2026-04-18T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35615
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18544
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642614
reference_id 1642614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642614
5
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
6
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2018-18544
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-15mv-khzp-fqfk
1
url VCID-1m2c-fyc2-2qf3
vulnerability_id VCID-1m2c-fyc2-2qf3
summary In GraphicsMagick 1.4 snapshot-20181209 Q8 on 32-bit platforms, there is a heap-based buffer over-read in the ReadBMPImage function of bmp.c, which allows attackers to cause a denial of service via a crafted bmp image file. This only affects GraphicsMagick installations with customized BMP limits.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20185
reference_id
reference_type
scores
0
value 0.00846
scoring_system epss
scoring_elements 0.74852
published_at 2026-04-21T12:55:00Z
1
value 0.00846
scoring_system epss
scoring_elements 0.74773
published_at 2026-04-01T12:55:00Z
2
value 0.00846
scoring_system epss
scoring_elements 0.74776
published_at 2026-04-02T12:55:00Z
3
value 0.00846
scoring_system epss
scoring_elements 0.74804
published_at 2026-04-04T12:55:00Z
4
value 0.00846
scoring_system epss
scoring_elements 0.74777
published_at 2026-04-07T12:55:00Z
5
value 0.00846
scoring_system epss
scoring_elements 0.7481
published_at 2026-04-08T12:55:00Z
6
value 0.00846
scoring_system epss
scoring_elements 0.74824
published_at 2026-04-09T12:55:00Z
7
value 0.00846
scoring_system epss
scoring_elements 0.74848
published_at 2026-04-11T12:55:00Z
8
value 0.00846
scoring_system epss
scoring_elements 0.74827
published_at 2026-04-12T12:55:00Z
9
value 0.00846
scoring_system epss
scoring_elements 0.74818
published_at 2026-04-13T12:55:00Z
10
value 0.00846
scoring_system epss
scoring_elements 0.74853
published_at 2026-04-16T12:55:00Z
11
value 0.00846
scoring_system epss
scoring_elements 0.74861
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20185
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20185
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916719
reference_id 916719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916719
4
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2018-20185
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1m2c-fyc2-2qf3
2
url VCID-2e5h-jf8c-dudp
vulnerability_id VCID-2e5h-jf8c-dudp
summary coders/xwd.c in GraphicsMagick 1.3.31 allows attackers to cause a denial of service (out-of-bounds read and application crash) by crafting an XWD image file, a different vulnerability than CVE-2019-11008 and CVE-2019-11009.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11473
reference_id
reference_type
scores
0
value 0.01274
scoring_system epss
scoring_elements 0.79481
published_at 2026-04-01T12:55:00Z
1
value 0.01274
scoring_system epss
scoring_elements 0.79488
published_at 2026-04-02T12:55:00Z
2
value 0.01274
scoring_system epss
scoring_elements 0.79511
published_at 2026-04-04T12:55:00Z
3
value 0.01274
scoring_system epss
scoring_elements 0.79497
published_at 2026-04-07T12:55:00Z
4
value 0.01274
scoring_system epss
scoring_elements 0.79525
published_at 2026-04-08T12:55:00Z
5
value 0.01274
scoring_system epss
scoring_elements 0.79533
published_at 2026-04-09T12:55:00Z
6
value 0.01274
scoring_system epss
scoring_elements 0.79555
published_at 2026-04-11T12:55:00Z
7
value 0.01274
scoring_system epss
scoring_elements 0.79538
published_at 2026-04-12T12:55:00Z
8
value 0.01274
scoring_system epss
scoring_elements 0.79529
published_at 2026-04-13T12:55:00Z
9
value 0.01274
scoring_system epss
scoring_elements 0.7956
published_at 2026-04-16T12:55:00Z
10
value 0.01274
scoring_system epss
scoring_elements 0.79558
published_at 2026-04-18T12:55:00Z
11
value 0.01274
scoring_system epss
scoring_elements 0.79563
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11473
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11473
2
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-11473
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2e5h-jf8c-dudp
3
url VCID-3qad-mewf-8khz
vulnerability_id VCID-3qad-mewf-8khz
summary ImageMagick: Memory leak in the WritePDFImage function in coders/pdf.c
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7397.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7397.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-7397
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.51521
published_at 2026-04-01T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.51649
published_at 2026-04-21T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.5162
published_at 2026-04-13T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.51662
published_at 2026-04-16T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.51669
published_at 2026-04-18T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51572
published_at 2026-04-02T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.51598
published_at 2026-04-04T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.51559
published_at 2026-04-07T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51613
published_at 2026-04-08T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.51609
published_at 2026-04-09T12:55:00Z
10
value 0.00282
scoring_system epss
scoring_elements 0.51658
published_at 2026-04-11T12:55:00Z
11
value 0.00282
scoring_system epss
scoring_elements 0.51637
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-7397
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
48
reference_url https://github.com/ImageMagick/ImageMagick/issues/1454
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1454
49
reference_url https://www.debian.org/security/2020/dsa-4712
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4712
50
reference_url http://www.securityfocus.com/bid/106847
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106847
51
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1672564
reference_id 1672564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1672564
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-7397
reference_id CVE-2019-7397
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-7397
61
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
62
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
63
reference_url https://usn.ubuntu.com/7068-1/
reference_id USN-7068-1
reference_type
scores
url https://usn.ubuntu.com/7068-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-7397
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qad-mewf-8khz
4
url VCID-4pd9-uv1z-6qfx
vulnerability_id VCID-4pd9-uv1z-6qfx
summary In GraphicsMagick from version 1.3.30 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WriteMATLABImage of coders/mat.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to ExportRedQuantumType in magick/export.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11506
reference_id
reference_type
scores
0
value 0.01488
scoring_system epss
scoring_elements 0.80983
published_at 2026-04-01T12:55:00Z
1
value 0.01488
scoring_system epss
scoring_elements 0.80992
published_at 2026-04-02T12:55:00Z
2
value 0.01488
scoring_system epss
scoring_elements 0.81015
published_at 2026-04-04T12:55:00Z
3
value 0.01488
scoring_system epss
scoring_elements 0.81014
published_at 2026-04-07T12:55:00Z
4
value 0.01488
scoring_system epss
scoring_elements 0.81042
published_at 2026-04-08T12:55:00Z
5
value 0.01488
scoring_system epss
scoring_elements 0.81049
published_at 2026-04-09T12:55:00Z
6
value 0.01488
scoring_system epss
scoring_elements 0.81066
published_at 2026-04-11T12:55:00Z
7
value 0.01488
scoring_system epss
scoring_elements 0.81053
published_at 2026-04-12T12:55:00Z
8
value 0.01488
scoring_system epss
scoring_elements 0.81045
published_at 2026-04-13T12:55:00Z
9
value 0.01488
scoring_system epss
scoring_elements 0.81083
published_at 2026-04-16T12:55:00Z
10
value 0.01488
scoring_system epss
scoring_elements 0.81084
published_at 2026-04-18T12:55:00Z
11
value 0.01488
scoring_system epss
scoring_elements 0.81081
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11506
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11506
2
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-11506
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4pd9-uv1z-6qfx
5
url VCID-5um7-kjwx-a7ft
vulnerability_id VCID-5um7-kjwx-a7ft
summary Buffer Overflow vulnerability in WritePCXImage function in pcx.c in GraphicsMagick 1.4 allows remote attackers to cause a denial of service via converting of crafted image file to pcx format.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-21679
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.30213
published_at 2026-04-21T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30401
published_at 2026-04-02T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30372
published_at 2026-04-01T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30446
published_at 2026-04-04T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30255
published_at 2026-04-07T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30314
published_at 2026-04-08T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30349
published_at 2026-04-09T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30353
published_at 2026-04-11T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30308
published_at 2026-04-12T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30261
published_at 2026-04-13T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30275
published_at 2026-04-16T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30257
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-21679
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21679
2
reference_url https://sourceforge.net/p/graphicsmagick/bugs/619/
reference_id 619
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:14:19Z/
url https://sourceforge.net/p/graphicsmagick/bugs/619/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2020-21679
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5um7-kjwx-a7ft
6
url VCID-756j-6ajn-zkcp
vulnerability_id VCID-756j-6ajn-zkcp
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19953
reference_id
reference_type
scores
0
value 0.01306
scoring_system epss
scoring_elements 0.79718
published_at 2026-04-01T12:55:00Z
1
value 0.01306
scoring_system epss
scoring_elements 0.79725
published_at 2026-04-02T12:55:00Z
2
value 0.01306
scoring_system epss
scoring_elements 0.79747
published_at 2026-04-04T12:55:00Z
3
value 0.01306
scoring_system epss
scoring_elements 0.79733
published_at 2026-04-07T12:55:00Z
4
value 0.01306
scoring_system epss
scoring_elements 0.79762
published_at 2026-04-08T12:55:00Z
5
value 0.01306
scoring_system epss
scoring_elements 0.79768
published_at 2026-04-09T12:55:00Z
6
value 0.01306
scoring_system epss
scoring_elements 0.7979
published_at 2026-04-11T12:55:00Z
7
value 0.01306
scoring_system epss
scoring_elements 0.79774
published_at 2026-04-12T12:55:00Z
8
value 0.01306
scoring_system epss
scoring_elements 0.79767
published_at 2026-04-13T12:55:00Z
9
value 0.01306
scoring_system epss
scoring_elements 0.79794
published_at 2026-04-16T12:55:00Z
10
value 0.01306
scoring_system epss
scoring_elements 0.79795
published_at 2026-04-18T12:55:00Z
11
value 0.01306
scoring_system epss
scoring_elements 0.79799
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19953
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19950
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947311
reference_id 947311
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947311
5
reference_url https://usn.ubuntu.com/USN-5190-1/
reference_id USN-USN-5190-1
reference_type
scores
url https://usn.ubuntu.com/USN-5190-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.30%2Bhg15796-1~deb9u4
purl pkg:deb/debian/graphicsmagick@1.3.30%2Bhg15796-1~deb9u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15mv-khzp-fqfk
1
vulnerability VCID-1m2c-fyc2-2qf3
2
vulnerability VCID-2e5h-jf8c-dudp
3
vulnerability VCID-3qad-mewf-8khz
4
vulnerability VCID-3tbg-j6gv-9ub8
5
vulnerability VCID-4pd9-uv1z-6qfx
6
vulnerability VCID-5um7-kjwx-a7ft
7
vulnerability VCID-756j-6ajn-zkcp
8
vulnerability VCID-am38-b487-k7bn
9
vulnerability VCID-bh46-tx2w-8bfq
10
vulnerability VCID-cxs4-yude-jba3
11
vulnerability VCID-ek9v-zmf4-u7aw
12
vulnerability VCID-ezcj-2yaf-rfhh
13
vulnerability VCID-k5jd-24qt-aqc6
14
vulnerability VCID-mw2s-6zec-8ucb
15
vulnerability VCID-qh3z-vna7-87h2
16
vulnerability VCID-qjhw-tswt-m3ak
17
vulnerability VCID-qtv6-ta8r-pka7
18
vulnerability VCID-sg7b-evpj-9fdd
19
vulnerability VCID-uvjy-tccq-bkhb
20
vulnerability VCID-v4yk-f1rh-efh3
21
vulnerability VCID-wwqv-tpq5-dqgs
22
vulnerability VCID-xvve-pj82-mfh6
23
vulnerability VCID-zvjw-vzvx-6qab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.30%252Bhg15796-1~deb9u4
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-19953
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-756j-6ajn-zkcp
7
url VCID-am38-b487-k7bn
vulnerability_id VCID-am38-b487-k7bn
summary In GraphicsMagick 1.3.31, the ReadDIBImage function of coders/dib.c has a vulnerability allowing a crash and denial of service via a dib file that is crafted to appear with direct pixel values and also colormapping (which is not available beyond 8-bits/sample), and therefore lacks indexes initialization.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20189
reference_id
reference_type
scores
0
value 0.01686
scoring_system epss
scoring_elements 0.82137
published_at 2026-04-01T12:55:00Z
1
value 0.01686
scoring_system epss
scoring_elements 0.8215
published_at 2026-04-02T12:55:00Z
2
value 0.01686
scoring_system epss
scoring_elements 0.82172
published_at 2026-04-04T12:55:00Z
3
value 0.01686
scoring_system epss
scoring_elements 0.82169
published_at 2026-04-07T12:55:00Z
4
value 0.01686
scoring_system epss
scoring_elements 0.82195
published_at 2026-04-08T12:55:00Z
5
value 0.01686
scoring_system epss
scoring_elements 0.82202
published_at 2026-04-09T12:55:00Z
6
value 0.01686
scoring_system epss
scoring_elements 0.82222
published_at 2026-04-11T12:55:00Z
7
value 0.01686
scoring_system epss
scoring_elements 0.82214
published_at 2026-04-12T12:55:00Z
8
value 0.01686
scoring_system epss
scoring_elements 0.82208
published_at 2026-04-13T12:55:00Z
9
value 0.01686
scoring_system epss
scoring_elements 0.82245
published_at 2026-04-18T12:55:00Z
10
value 0.01686
scoring_system epss
scoring_elements 0.82246
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20189
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20189
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916752
reference_id 916752
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916752
3
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
4
reference_url https://usn.ubuntu.com/5974-1/
reference_id USN-5974-1
reference_type
scores
url https://usn.ubuntu.com/5974-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2018-20189
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-am38-b487-k7bn
8
url VCID-bh46-tx2w-8bfq
vulnerability_id VCID-bh46-tx2w-8bfq
summary In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a stack-based buffer overflow in the function SVGStartElement of coders/svg.c, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a quoted font family value.
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/b6fb77d7d54d
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/b6fb77d7d54d
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11005
reference_id
reference_type
scores
0
value 0.02255
scoring_system epss
scoring_elements 0.84622
published_at 2026-04-21T12:55:00Z
1
value 0.02255
scoring_system epss
scoring_elements 0.846
published_at 2026-04-13T12:55:00Z
2
value 0.02255
scoring_system epss
scoring_elements 0.8462
published_at 2026-04-18T12:55:00Z
3
value 0.02255
scoring_system epss
scoring_elements 0.84522
published_at 2026-04-01T12:55:00Z
4
value 0.02255
scoring_system epss
scoring_elements 0.84537
published_at 2026-04-02T12:55:00Z
5
value 0.02255
scoring_system epss
scoring_elements 0.84559
published_at 2026-04-04T12:55:00Z
6
value 0.02255
scoring_system epss
scoring_elements 0.84562
published_at 2026-04-07T12:55:00Z
7
value 0.02255
scoring_system epss
scoring_elements 0.84584
published_at 2026-04-08T12:55:00Z
8
value 0.02255
scoring_system epss
scoring_elements 0.8459
published_at 2026-04-09T12:55:00Z
9
value 0.02255
scoring_system epss
scoring_elements 0.84609
published_at 2026-04-11T12:55:00Z
10
value 0.02255
scoring_system epss
scoring_elements 0.84604
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11005
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11005
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://sourceforge.net/p/graphicsmagick/bugs/600/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/600/
7
reference_url https://www.debian.org/security/2020/dsa-4640
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4640
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
reference_id 927029
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-11005
reference_id CVE-2019-11005
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-11005
13
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-11005
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bh46-tx2w-8bfq
9
url VCID-cxs4-yude-jba3
vulnerability_id VCID-cxs4-yude-jba3
summary In GraphicsMagick from version 1.3.8 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WritePDBImage of coders/pdb.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to MagickBitStreamMSBWrite in magick/bit_stream.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11505
reference_id
reference_type
scores
0
value 0.01121
scoring_system epss
scoring_elements 0.7827
published_at 2026-04-21T12:55:00Z
1
value 0.01121
scoring_system epss
scoring_elements 0.78187
published_at 2026-04-01T12:55:00Z
2
value 0.01121
scoring_system epss
scoring_elements 0.78196
published_at 2026-04-02T12:55:00Z
3
value 0.01121
scoring_system epss
scoring_elements 0.78226
published_at 2026-04-04T12:55:00Z
4
value 0.01121
scoring_system epss
scoring_elements 0.78208
published_at 2026-04-07T12:55:00Z
5
value 0.01121
scoring_system epss
scoring_elements 0.78235
published_at 2026-04-08T12:55:00Z
6
value 0.01121
scoring_system epss
scoring_elements 0.7824
published_at 2026-04-09T12:55:00Z
7
value 0.01121
scoring_system epss
scoring_elements 0.78265
published_at 2026-04-11T12:55:00Z
8
value 0.01121
scoring_system epss
scoring_elements 0.78248
published_at 2026-04-12T12:55:00Z
9
value 0.01121
scoring_system epss
scoring_elements 0.78244
published_at 2026-04-13T12:55:00Z
10
value 0.01121
scoring_system epss
scoring_elements 0.78275
published_at 2026-04-16T12:55:00Z
11
value 0.01121
scoring_system epss
scoring_elements 0.78273
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11505
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11505
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-11505
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cxs4-yude-jba3
10
url VCID-ek9v-zmf4-u7aw
vulnerability_id VCID-ek9v-zmf4-u7aw
summary In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a memory leak in the function ReadMPCImage of coders/mpc.c, which allows attackers to cause a denial of service via a crafted image file.
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/a348d9661019
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/a348d9661019
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11010
reference_id
reference_type
scores
0
value 0.00605
scoring_system epss
scoring_elements 0.6964
published_at 2026-04-18T12:55:00Z
1
value 0.00605
scoring_system epss
scoring_elements 0.69592
published_at 2026-04-13T12:55:00Z
2
value 0.00605
scoring_system epss
scoring_elements 0.69631
published_at 2026-04-16T12:55:00Z
3
value 0.00605
scoring_system epss
scoring_elements 0.69526
published_at 2026-04-01T12:55:00Z
4
value 0.00605
scoring_system epss
scoring_elements 0.69537
published_at 2026-04-02T12:55:00Z
5
value 0.00605
scoring_system epss
scoring_elements 0.69553
published_at 2026-04-04T12:55:00Z
6
value 0.00605
scoring_system epss
scoring_elements 0.69532
published_at 2026-04-07T12:55:00Z
7
value 0.00605
scoring_system epss
scoring_elements 0.69582
published_at 2026-04-08T12:55:00Z
8
value 0.00605
scoring_system epss
scoring_elements 0.69599
published_at 2026-04-09T12:55:00Z
9
value 0.00605
scoring_system epss
scoring_elements 0.69621
published_at 2026-04-21T12:55:00Z
10
value 0.00605
scoring_system epss
scoring_elements 0.69606
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11010
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11010
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
7
reference_url https://sourceforge.net/p/graphicsmagick/bugs/601/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/601/
8
reference_url https://www.debian.org/security/2020/dsa-4640
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4640
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
reference_id 927029
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-11010
reference_id CVE-2019-11010
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-11010
15
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-11010
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ek9v-zmf4-u7aw
11
url VCID-ezcj-2yaf-rfhh
vulnerability_id VCID-ezcj-2yaf-rfhh
summary ImageMagick: memory leak in coders/dps.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16709.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16709.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16709
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40569
published_at 2026-04-01T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.40559
published_at 2026-04-21T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40622
published_at 2026-04-13T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40668
published_at 2026-04-16T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40637
published_at 2026-04-18T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40651
published_at 2026-04-02T12:55:00Z
6
value 0.00188
scoring_system epss
scoring_elements 0.40679
published_at 2026-04-04T12:55:00Z
7
value 0.00188
scoring_system epss
scoring_elements 0.40599
published_at 2026-04-07T12:55:00Z
8
value 0.00188
scoring_system epss
scoring_elements 0.4065
published_at 2026-04-08T12:55:00Z
9
value 0.00188
scoring_system epss
scoring_elements 0.40659
published_at 2026-04-09T12:55:00Z
10
value 0.00188
scoring_system epss
scoring_elements 0.40677
published_at 2026-04-11T12:55:00Z
11
value 0.00188
scoring_system epss
scoring_elements 0.4064
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16709
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/ImageMagick/ImageMagick/issues/1531
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1531
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801661
reference_id 1801661
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801661
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:backports:sle-15:-:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:backports:sle-15:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:backports:sle-15:-:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16709
reference_id CVE-2019-16709
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-16709
20
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
21
reference_url https://usn.ubuntu.com/4192-1/
reference_id USN-4192-1
reference_type
scores
url https://usn.ubuntu.com/4192-1/
22
reference_url https://usn.ubuntu.com/7053-1/
reference_id USN-7053-1
reference_type
scores
url https://usn.ubuntu.com/7053-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-16709
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ezcj-2yaf-rfhh
12
url VCID-k5jd-24qt-aqc6
vulnerability_id VCID-k5jd-24qt-aqc6
summary In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadXWDImage of coders/xwd.c, which allows attackers to cause a denial of service or information disclosure via a crafted image file.
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/7cff2b1792de
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/7cff2b1792de
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11009
reference_id
reference_type
scores
0
value 0.01329
scoring_system epss
scoring_elements 0.79967
published_at 2026-04-21T12:55:00Z
1
value 0.01329
scoring_system epss
scoring_elements 0.79936
published_at 2026-04-13T12:55:00Z
2
value 0.01329
scoring_system epss
scoring_elements 0.79964
published_at 2026-04-18T12:55:00Z
3
value 0.01329
scoring_system epss
scoring_elements 0.79888
published_at 2026-04-01T12:55:00Z
4
value 0.01329
scoring_system epss
scoring_elements 0.79895
published_at 2026-04-02T12:55:00Z
5
value 0.01329
scoring_system epss
scoring_elements 0.79916
published_at 2026-04-04T12:55:00Z
6
value 0.01329
scoring_system epss
scoring_elements 0.79903
published_at 2026-04-07T12:55:00Z
7
value 0.01329
scoring_system epss
scoring_elements 0.79932
published_at 2026-04-08T12:55:00Z
8
value 0.01329
scoring_system epss
scoring_elements 0.79941
published_at 2026-04-09T12:55:00Z
9
value 0.01329
scoring_system epss
scoring_elements 0.79961
published_at 2026-04-11T12:55:00Z
10
value 0.01329
scoring_system epss
scoring_elements 0.79944
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11009
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11009
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
11
reference_url https://sourceforge.net/p/graphicsmagick/bugs/597/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/597/
12
reference_url https://www.debian.org/security/2020/dsa-4640
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4640
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
reference_id 927029
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-11009
reference_id CVE-2019-11009
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-11009
19
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-11009
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k5jd-24qt-aqc6
13
url VCID-mw2s-6zec-8ucb
vulnerability_id VCID-mw2s-6zec-8ucb
summary In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the ReadMNGImage function of coders/png.c, which allows attackers to cause a denial of service or information disclosure via an image colormap.
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/40fc71472b98
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/40fc71472b98
1
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/86a9295e7c83
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/86a9295e7c83
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11007
reference_id
reference_type
scores
0
value 0.02106
scoring_system epss
scoring_elements 0.84115
published_at 2026-04-21T12:55:00Z
1
value 0.02106
scoring_system epss
scoring_elements 0.84113
published_at 2026-04-18T12:55:00Z
2
value 0.02106
scoring_system epss
scoring_elements 0.84019
published_at 2026-04-01T12:55:00Z
3
value 0.02106
scoring_system epss
scoring_elements 0.84033
published_at 2026-04-02T12:55:00Z
4
value 0.02106
scoring_system epss
scoring_elements 0.84049
published_at 2026-04-04T12:55:00Z
5
value 0.02106
scoring_system epss
scoring_elements 0.84052
published_at 2026-04-07T12:55:00Z
6
value 0.02106
scoring_system epss
scoring_elements 0.84075
published_at 2026-04-08T12:55:00Z
7
value 0.02106
scoring_system epss
scoring_elements 0.84082
published_at 2026-04-09T12:55:00Z
8
value 0.02106
scoring_system epss
scoring_elements 0.84099
published_at 2026-04-11T12:55:00Z
9
value 0.02106
scoring_system epss
scoring_elements 0.84093
published_at 2026-04-12T12:55:00Z
10
value 0.02106
scoring_system epss
scoring_elements 0.84088
published_at 2026-04-13T12:55:00Z
11
value 0.02106
scoring_system epss
scoring_elements 0.8411
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11007
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11007
8
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
9
reference_url https://sourceforge.net/p/graphicsmagick/bugs/596/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/596/
10
reference_url https://www.debian.org/security/2020/dsa-4640
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4640
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
reference_id 927029
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-11007
reference_id CVE-2019-11007
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-11007
21
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-11007
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mw2s-6zec-8ucb
14
url VCID-qh3z-vna7-87h2
vulnerability_id VCID-qh3z-vna7-87h2
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12921
reference_id
reference_type
scores
0
value 0.05729
scoring_system epss
scoring_elements 0.90453
published_at 2026-04-21T12:55:00Z
1
value 0.05729
scoring_system epss
scoring_elements 0.90456
published_at 2026-04-16T12:55:00Z
2
value 0.05729
scoring_system epss
scoring_elements 0.90455
published_at 2026-04-18T12:55:00Z
3
value 0.05729
scoring_system epss
scoring_elements 0.904
published_at 2026-04-01T12:55:00Z
4
value 0.05729
scoring_system epss
scoring_elements 0.90404
published_at 2026-04-02T12:55:00Z
5
value 0.05729
scoring_system epss
scoring_elements 0.90416
published_at 2026-04-04T12:55:00Z
6
value 0.05729
scoring_system epss
scoring_elements 0.9042
published_at 2026-04-07T12:55:00Z
7
value 0.05729
scoring_system epss
scoring_elements 0.90434
published_at 2026-04-08T12:55:00Z
8
value 0.05729
scoring_system epss
scoring_elements 0.9044
published_at 2026-04-13T12:55:00Z
9
value 0.05729
scoring_system epss
scoring_elements 0.90448
published_at 2026-04-11T12:55:00Z
10
value 0.05729
scoring_system epss
scoring_elements 0.90447
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12921
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12921
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10938
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md
reference_id
reference_type
scores
url https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md
7
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00026.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/03/msg00026.html
8
reference_url https://www.debian.org/security/2020/dsa-4675
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4675
9
reference_url http://www.graphicsmagick.org/
reference_id
reference_type
scores
url http://www.graphicsmagick.org/
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-12921
reference_id CVE-2019-12921
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-12921
17
reference_url https://usn.ubuntu.com/USN-5190-1/
reference_id USN-USN-5190-1
reference_type
scores
url https://usn.ubuntu.com/USN-5190-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.30%2Bhg15796-1~deb9u4
purl pkg:deb/debian/graphicsmagick@1.3.30%2Bhg15796-1~deb9u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15mv-khzp-fqfk
1
vulnerability VCID-1m2c-fyc2-2qf3
2
vulnerability VCID-2e5h-jf8c-dudp
3
vulnerability VCID-3qad-mewf-8khz
4
vulnerability VCID-3tbg-j6gv-9ub8
5
vulnerability VCID-4pd9-uv1z-6qfx
6
vulnerability VCID-5um7-kjwx-a7ft
7
vulnerability VCID-756j-6ajn-zkcp
8
vulnerability VCID-am38-b487-k7bn
9
vulnerability VCID-bh46-tx2w-8bfq
10
vulnerability VCID-cxs4-yude-jba3
11
vulnerability VCID-ek9v-zmf4-u7aw
12
vulnerability VCID-ezcj-2yaf-rfhh
13
vulnerability VCID-k5jd-24qt-aqc6
14
vulnerability VCID-mw2s-6zec-8ucb
15
vulnerability VCID-qh3z-vna7-87h2
16
vulnerability VCID-qjhw-tswt-m3ak
17
vulnerability VCID-qtv6-ta8r-pka7
18
vulnerability VCID-sg7b-evpj-9fdd
19
vulnerability VCID-uvjy-tccq-bkhb
20
vulnerability VCID-v4yk-f1rh-efh3
21
vulnerability VCID-wwqv-tpq5-dqgs
22
vulnerability VCID-xvve-pj82-mfh6
23
vulnerability VCID-zvjw-vzvx-6qab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.30%252Bhg15796-1~deb9u4
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-12921
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qh3z-vna7-87h2
15
url VCID-qjhw-tswt-m3ak
vulnerability_id VCID-qjhw-tswt-m3ak
summary In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer overflow in the function WriteXWDImage of coders/xwd.c, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file.
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/d823d23a474b
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/d823d23a474b
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11008
reference_id
reference_type
scores
0
value 0.02084
scoring_system epss
scoring_elements 0.84028
published_at 2026-04-21T12:55:00Z
1
value 0.02084
scoring_system epss
scoring_elements 0.84024
published_at 2026-04-16T12:55:00Z
2
value 0.02084
scoring_system epss
scoring_elements 0.84026
published_at 2026-04-18T12:55:00Z
3
value 0.02084
scoring_system epss
scoring_elements 0.83932
published_at 2026-04-01T12:55:00Z
4
value 0.02084
scoring_system epss
scoring_elements 0.83946
published_at 2026-04-02T12:55:00Z
5
value 0.02084
scoring_system epss
scoring_elements 0.83962
published_at 2026-04-04T12:55:00Z
6
value 0.02084
scoring_system epss
scoring_elements 0.83964
published_at 2026-04-07T12:55:00Z
7
value 0.02084
scoring_system epss
scoring_elements 0.83987
published_at 2026-04-08T12:55:00Z
8
value 0.02084
scoring_system epss
scoring_elements 0.83994
published_at 2026-04-09T12:55:00Z
9
value 0.02084
scoring_system epss
scoring_elements 0.84009
published_at 2026-04-11T12:55:00Z
10
value 0.02084
scoring_system epss
scoring_elements 0.84004
published_at 2026-04-12T12:55:00Z
11
value 0.02084
scoring_system epss
scoring_elements 0.84
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11008
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11008
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
12
reference_url https://sourceforge.net/p/graphicsmagick/bugs/599/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/599/
13
reference_url https://www.debian.org/security/2020/dsa-4640
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4640
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
reference_id 927029
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-11008
reference_id CVE-2019-11008
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-11008
24
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-11008
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qjhw-tswt-m3ak
16
url VCID-qtv6-ta8r-pka7
vulnerability_id VCID-qtv6-ta8r-pka7
summary In GraphicsMagick 1.4 snapshot-20181209 Q8, there is a heap-based buffer overflow in the WriteTGAImage function of tga.c, which allows attackers to cause a denial of service via a crafted image file, because the number of rows or columns can exceed the pixel-dimension restrictions of the TGA specification.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20184
reference_id
reference_type
scores
0
value 0.00711
scoring_system epss
scoring_elements 0.72278
published_at 2026-04-21T12:55:00Z
1
value 0.00711
scoring_system epss
scoring_elements 0.72196
published_at 2026-04-01T12:55:00Z
2
value 0.00711
scoring_system epss
scoring_elements 0.72201
published_at 2026-04-02T12:55:00Z
3
value 0.00711
scoring_system epss
scoring_elements 0.72221
published_at 2026-04-04T12:55:00Z
4
value 0.00711
scoring_system epss
scoring_elements 0.72197
published_at 2026-04-07T12:55:00Z
5
value 0.00711
scoring_system epss
scoring_elements 0.72233
published_at 2026-04-08T12:55:00Z
6
value 0.00711
scoring_system epss
scoring_elements 0.72246
published_at 2026-04-09T12:55:00Z
7
value 0.00711
scoring_system epss
scoring_elements 0.72268
published_at 2026-04-11T12:55:00Z
8
value 0.00711
scoring_system epss
scoring_elements 0.72252
published_at 2026-04-12T12:55:00Z
9
value 0.00711
scoring_system epss
scoring_elements 0.72238
published_at 2026-04-13T12:55:00Z
10
value 0.00711
scoring_system epss
scoring_elements 0.72281
published_at 2026-04-16T12:55:00Z
11
value 0.00711
scoring_system epss
scoring_elements 0.7229
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20184
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20184
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916721
reference_id 916721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916721
4
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
5
reference_url https://usn.ubuntu.com/5974-1/
reference_id USN-5974-1
reference_type
scores
url https://usn.ubuntu.com/5974-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2018-20184
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtv6-ta8r-pka7
17
url VCID-sg7b-evpj-9fdd
vulnerability_id VCID-sg7b-evpj-9fdd
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10938
reference_id
reference_type
scores
0
value 0.02898
scoring_system epss
scoring_elements 0.86346
published_at 2026-04-21T12:55:00Z
1
value 0.02898
scoring_system epss
scoring_elements 0.86353
published_at 2026-04-18T12:55:00Z
2
value 0.02898
scoring_system epss
scoring_elements 0.86268
published_at 2026-04-01T12:55:00Z
3
value 0.02898
scoring_system epss
scoring_elements 0.86278
published_at 2026-04-02T12:55:00Z
4
value 0.02898
scoring_system epss
scoring_elements 0.86296
published_at 2026-04-04T12:55:00Z
5
value 0.02898
scoring_system epss
scoring_elements 0.86297
published_at 2026-04-07T12:55:00Z
6
value 0.02898
scoring_system epss
scoring_elements 0.86315
published_at 2026-04-08T12:55:00Z
7
value 0.02898
scoring_system epss
scoring_elements 0.86325
published_at 2026-04-09T12:55:00Z
8
value 0.02898
scoring_system epss
scoring_elements 0.86339
published_at 2026-04-11T12:55:00Z
9
value 0.02898
scoring_system epss
scoring_elements 0.86337
published_at 2026-04-12T12:55:00Z
10
value 0.02898
scoring_system epss
scoring_elements 0.86332
published_at 2026-04-13T12:55:00Z
11
value 0.02898
scoring_system epss
scoring_elements 0.86348
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10938
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12921
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10938
5
reference_url https://lists.debian.org/debian-lts-announce/2020/04/msg00007.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/04/msg00007.html
6
reference_url https://sourceforge.net/p/graphicsmagick/code/ci/5b4dd7c6674140a115ec9424c8d19c6a458fac3e/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/code/ci/5b4dd7c6674140a115ec9424c8d19c6a458fac3e/
7
reference_url https://www.debian.org/security/2020/dsa-4675
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4675
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-10938
reference_id CVE-2020-10938
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-10938
15
reference_url https://usn.ubuntu.com/USN-5190-1/
reference_id USN-USN-5190-1
reference_type
scores
url https://usn.ubuntu.com/USN-5190-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.30%2Bhg15796-1~deb9u4
purl pkg:deb/debian/graphicsmagick@1.3.30%2Bhg15796-1~deb9u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15mv-khzp-fqfk
1
vulnerability VCID-1m2c-fyc2-2qf3
2
vulnerability VCID-2e5h-jf8c-dudp
3
vulnerability VCID-3qad-mewf-8khz
4
vulnerability VCID-3tbg-j6gv-9ub8
5
vulnerability VCID-4pd9-uv1z-6qfx
6
vulnerability VCID-5um7-kjwx-a7ft
7
vulnerability VCID-756j-6ajn-zkcp
8
vulnerability VCID-am38-b487-k7bn
9
vulnerability VCID-bh46-tx2w-8bfq
10
vulnerability VCID-cxs4-yude-jba3
11
vulnerability VCID-ek9v-zmf4-u7aw
12
vulnerability VCID-ezcj-2yaf-rfhh
13
vulnerability VCID-k5jd-24qt-aqc6
14
vulnerability VCID-mw2s-6zec-8ucb
15
vulnerability VCID-qh3z-vna7-87h2
16
vulnerability VCID-qjhw-tswt-m3ak
17
vulnerability VCID-qtv6-ta8r-pka7
18
vulnerability VCID-sg7b-evpj-9fdd
19
vulnerability VCID-uvjy-tccq-bkhb
20
vulnerability VCID-v4yk-f1rh-efh3
21
vulnerability VCID-wwqv-tpq5-dqgs
22
vulnerability VCID-xvve-pj82-mfh6
23
vulnerability VCID-zvjw-vzvx-6qab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.30%252Bhg15796-1~deb9u4
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2020-10938
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sg7b-evpj-9fdd
18
url VCID-v4yk-f1rh-efh3
vulnerability_id VCID-v4yk-f1rh-efh3
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19950
reference_id
reference_type
scores
0
value 0.01204
scoring_system epss
scoring_elements 0.78891
published_at 2026-04-01T12:55:00Z
1
value 0.01204
scoring_system epss
scoring_elements 0.78897
published_at 2026-04-02T12:55:00Z
2
value 0.01204
scoring_system epss
scoring_elements 0.78926
published_at 2026-04-04T12:55:00Z
3
value 0.01204
scoring_system epss
scoring_elements 0.78909
published_at 2026-04-07T12:55:00Z
4
value 0.01204
scoring_system epss
scoring_elements 0.78933
published_at 2026-04-08T12:55:00Z
5
value 0.01204
scoring_system epss
scoring_elements 0.78939
published_at 2026-04-09T12:55:00Z
6
value 0.01204
scoring_system epss
scoring_elements 0.78963
published_at 2026-04-21T12:55:00Z
7
value 0.01204
scoring_system epss
scoring_elements 0.78948
published_at 2026-04-12T12:55:00Z
8
value 0.01204
scoring_system epss
scoring_elements 0.78938
published_at 2026-04-13T12:55:00Z
9
value 0.01204
scoring_system epss
scoring_elements 0.78967
published_at 2026-04-16T12:55:00Z
10
value 0.01204
scoring_system epss
scoring_elements 0.78964
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19950
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19950
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953
4
reference_url https://usn.ubuntu.com/USN-5190-1/
reference_id USN-USN-5190-1
reference_type
scores
url https://usn.ubuntu.com/USN-5190-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.30%2Bhg15796-1~deb9u4
purl pkg:deb/debian/graphicsmagick@1.3.30%2Bhg15796-1~deb9u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15mv-khzp-fqfk
1
vulnerability VCID-1m2c-fyc2-2qf3
2
vulnerability VCID-2e5h-jf8c-dudp
3
vulnerability VCID-3qad-mewf-8khz
4
vulnerability VCID-3tbg-j6gv-9ub8
5
vulnerability VCID-4pd9-uv1z-6qfx
6
vulnerability VCID-5um7-kjwx-a7ft
7
vulnerability VCID-756j-6ajn-zkcp
8
vulnerability VCID-am38-b487-k7bn
9
vulnerability VCID-bh46-tx2w-8bfq
10
vulnerability VCID-cxs4-yude-jba3
11
vulnerability VCID-ek9v-zmf4-u7aw
12
vulnerability VCID-ezcj-2yaf-rfhh
13
vulnerability VCID-k5jd-24qt-aqc6
14
vulnerability VCID-mw2s-6zec-8ucb
15
vulnerability VCID-qh3z-vna7-87h2
16
vulnerability VCID-qjhw-tswt-m3ak
17
vulnerability VCID-qtv6-ta8r-pka7
18
vulnerability VCID-sg7b-evpj-9fdd
19
vulnerability VCID-uvjy-tccq-bkhb
20
vulnerability VCID-v4yk-f1rh-efh3
21
vulnerability VCID-wwqv-tpq5-dqgs
22
vulnerability VCID-xvve-pj82-mfh6
23
vulnerability VCID-zvjw-vzvx-6qab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.30%252Bhg15796-1~deb9u4
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-19950
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v4yk-f1rh-efh3
19
url VCID-wwqv-tpq5-dqgs
vulnerability_id VCID-wwqv-tpq5-dqgs
summary coders/xwd.c in GraphicsMagick 1.3.31 allows attackers to cause a denial of service (floating-point exception and application crash) by crafting an XWD image file, a different vulnerability than CVE-2019-11008 and CVE-2019-11009.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11474
reference_id
reference_type
scores
0
value 0.0298
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-01T12:55:00Z
1
value 0.0298
scoring_system epss
scoring_elements 0.86472
published_at 2026-04-02T12:55:00Z
2
value 0.0298
scoring_system epss
scoring_elements 0.8649
published_at 2026-04-07T12:55:00Z
3
value 0.0298
scoring_system epss
scoring_elements 0.86509
published_at 2026-04-08T12:55:00Z
4
value 0.0298
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-09T12:55:00Z
5
value 0.0298
scoring_system epss
scoring_elements 0.86533
published_at 2026-04-11T12:55:00Z
6
value 0.0298
scoring_system epss
scoring_elements 0.8653
published_at 2026-04-12T12:55:00Z
7
value 0.0298
scoring_system epss
scoring_elements 0.86525
published_at 2026-04-13T12:55:00Z
8
value 0.0298
scoring_system epss
scoring_elements 0.8654
published_at 2026-04-16T12:55:00Z
9
value 0.0298
scoring_system epss
scoring_elements 0.86545
published_at 2026-04-18T12:55:00Z
10
value 0.0298
scoring_system epss
scoring_elements 0.86538
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11474
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11474
2
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-11474
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wwqv-tpq5-dqgs
20
url VCID-xvve-pj82-mfh6
vulnerability_id VCID-xvve-pj82-mfh6
summary In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadMIFFImage of coders/miff.c, which allows attackers to cause a denial of service or information disclosure via an RLE packet.
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/f7610c1281c1
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/f7610c1281c1
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11006
reference_id
reference_type
scores
0
value 0.01406
scoring_system epss
scoring_elements 0.80499
published_at 2026-04-21T12:55:00Z
1
value 0.01406
scoring_system epss
scoring_elements 0.80467
published_at 2026-04-13T12:55:00Z
2
value 0.01406
scoring_system epss
scoring_elements 0.80496
published_at 2026-04-18T12:55:00Z
3
value 0.01406
scoring_system epss
scoring_elements 0.80415
published_at 2026-04-01T12:55:00Z
4
value 0.01406
scoring_system epss
scoring_elements 0.80421
published_at 2026-04-02T12:55:00Z
5
value 0.01406
scoring_system epss
scoring_elements 0.80442
published_at 2026-04-04T12:55:00Z
6
value 0.01406
scoring_system epss
scoring_elements 0.80431
published_at 2026-04-07T12:55:00Z
7
value 0.01406
scoring_system epss
scoring_elements 0.80461
published_at 2026-04-08T12:55:00Z
8
value 0.01406
scoring_system epss
scoring_elements 0.80471
published_at 2026-04-09T12:55:00Z
9
value 0.01406
scoring_system epss
scoring_elements 0.80489
published_at 2026-04-11T12:55:00Z
10
value 0.01406
scoring_system epss
scoring_elements 0.80474
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11006
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11006
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
7
reference_url https://sourceforge.net/p/graphicsmagick/bugs/598/
reference_id
reference_type
scores
url https://sourceforge.net/p/graphicsmagick/bugs/598/
8
reference_url https://www.debian.org/security/2020/dsa-4640
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4640
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
reference_id 927029
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927029
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-11006
reference_id CVE-2019-11006
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-11006
15
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
16
reference_url https://usn.ubuntu.com/5974-1/
reference_id USN-5974-1
reference_type
scores
url https://usn.ubuntu.com/5974-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-11006
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xvve-pj82-mfh6
21
url VCID-zvjw-vzvx-6qab
vulnerability_id VCID-zvjw-vzvx-6qab
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19951
reference_id
reference_type
scores
0
value 0.0144
scoring_system epss
scoring_elements 0.80659
published_at 2026-04-01T12:55:00Z
1
value 0.0144
scoring_system epss
scoring_elements 0.80668
published_at 2026-04-02T12:55:00Z
2
value 0.0144
scoring_system epss
scoring_elements 0.80689
published_at 2026-04-04T12:55:00Z
3
value 0.0144
scoring_system epss
scoring_elements 0.80684
published_at 2026-04-07T12:55:00Z
4
value 0.0144
scoring_system epss
scoring_elements 0.80713
published_at 2026-04-08T12:55:00Z
5
value 0.0144
scoring_system epss
scoring_elements 0.80723
published_at 2026-04-09T12:55:00Z
6
value 0.0144
scoring_system epss
scoring_elements 0.80739
published_at 2026-04-11T12:55:00Z
7
value 0.0144
scoring_system epss
scoring_elements 0.80725
published_at 2026-04-12T12:55:00Z
8
value 0.0144
scoring_system epss
scoring_elements 0.80717
published_at 2026-04-13T12:55:00Z
9
value 0.0144
scoring_system epss
scoring_elements 0.80753
published_at 2026-04-16T12:55:00Z
10
value 0.0144
scoring_system epss
scoring_elements 0.80754
published_at 2026-04-18T12:55:00Z
11
value 0.0144
scoring_system epss
scoring_elements 0.80756
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19951
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19950
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953
4
reference_url https://usn.ubuntu.com/USN-5190-1/
reference_id USN-USN-5190-1
reference_type
scores
url https://usn.ubuntu.com/USN-5190-1/
fixed_packages
0
url pkg:deb/debian/graphicsmagick@1.3.30%2Bhg15796-1~deb9u4
purl pkg:deb/debian/graphicsmagick@1.3.30%2Bhg15796-1~deb9u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15mv-khzp-fqfk
1
vulnerability VCID-1m2c-fyc2-2qf3
2
vulnerability VCID-2e5h-jf8c-dudp
3
vulnerability VCID-3qad-mewf-8khz
4
vulnerability VCID-3tbg-j6gv-9ub8
5
vulnerability VCID-4pd9-uv1z-6qfx
6
vulnerability VCID-5um7-kjwx-a7ft
7
vulnerability VCID-756j-6ajn-zkcp
8
vulnerability VCID-am38-b487-k7bn
9
vulnerability VCID-bh46-tx2w-8bfq
10
vulnerability VCID-cxs4-yude-jba3
11
vulnerability VCID-ek9v-zmf4-u7aw
12
vulnerability VCID-ezcj-2yaf-rfhh
13
vulnerability VCID-k5jd-24qt-aqc6
14
vulnerability VCID-mw2s-6zec-8ucb
15
vulnerability VCID-qh3z-vna7-87h2
16
vulnerability VCID-qjhw-tswt-m3ak
17
vulnerability VCID-qtv6-ta8r-pka7
18
vulnerability VCID-sg7b-evpj-9fdd
19
vulnerability VCID-uvjy-tccq-bkhb
20
vulnerability VCID-v4yk-f1rh-efh3
21
vulnerability VCID-wwqv-tpq5-dqgs
22
vulnerability VCID-xvve-pj82-mfh6
23
vulnerability VCID-zvjw-vzvx-6qab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.3.30%252Bhg15796-1~deb9u4
1
url pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
purl pkg:deb/debian/graphicsmagick@1.4%2Breally1.3.35-1~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3tbg-j6gv-9ub8
1
vulnerability VCID-uvjy-tccq-bkhb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2
aliases CVE-2019-19951
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zvjw-vzvx-6qab
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/graphicsmagick@1.4%252Breally1.3.35-1~deb10u2