Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=x86&distroversion=v3.18&reponame=community
Typeapk
Namespacealpine
Namegraphicsmagick
Version1.3.32-r0
Qualifiers
arch x86
distroversion v3.18
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.3.35-r0
Latest_non_vulnerable_version1.3.38-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-15mv-khzp-fqfk
vulnerability_id VCID-15mv-khzp-fqfk
summary ImageMagick: memory leak in WriteMSLImage of coders/msl.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18544.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18544.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18544
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35516
published_at 2026-04-01T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35718
published_at 2026-04-02T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35743
published_at 2026-04-04T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35624
published_at 2026-04-07T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.3567
published_at 2026-04-08T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35693
published_at 2026-04-09T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35703
published_at 2026-04-11T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35658
published_at 2026-04-12T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35636
published_at 2026-04-13T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35675
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18544
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642614
reference_id 1642614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642614
5
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
6
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
fixed_packages
0
url pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=x86&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=x86&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.32-r0%3Farch=x86&distroversion=v3.18&reponame=community
aliases CVE-2018-18544
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-15mv-khzp-fqfk
1
url VCID-2e5h-jf8c-dudp
vulnerability_id VCID-2e5h-jf8c-dudp
summary coders/xwd.c in GraphicsMagick 1.3.31 allows attackers to cause a denial of service (out-of-bounds read and application crash) by crafting an XWD image file, a different vulnerability than CVE-2019-11008 and CVE-2019-11009.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11473
reference_id
reference_type
scores
0
value 0.01274
scoring_system epss
scoring_elements 0.79481
published_at 2026-04-01T12:55:00Z
1
value 0.01274
scoring_system epss
scoring_elements 0.79488
published_at 2026-04-02T12:55:00Z
2
value 0.01274
scoring_system epss
scoring_elements 0.79511
published_at 2026-04-04T12:55:00Z
3
value 0.01274
scoring_system epss
scoring_elements 0.79497
published_at 2026-04-07T12:55:00Z
4
value 0.01274
scoring_system epss
scoring_elements 0.79525
published_at 2026-04-08T12:55:00Z
5
value 0.01274
scoring_system epss
scoring_elements 0.79533
published_at 2026-04-09T12:55:00Z
6
value 0.01274
scoring_system epss
scoring_elements 0.79555
published_at 2026-04-11T12:55:00Z
7
value 0.01274
scoring_system epss
scoring_elements 0.79538
published_at 2026-04-12T12:55:00Z
8
value 0.01274
scoring_system epss
scoring_elements 0.79529
published_at 2026-04-13T12:55:00Z
9
value 0.01274
scoring_system epss
scoring_elements 0.7956
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11473
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11473
2
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=x86&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=x86&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.32-r0%3Farch=x86&distroversion=v3.18&reponame=community
aliases CVE-2019-11473
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2e5h-jf8c-dudp
2
url VCID-3qad-mewf-8khz
vulnerability_id VCID-3qad-mewf-8khz
summary ImageMagick: Memory leak in the WritePDFImage function in coders/pdf.c
references
0
reference_url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
reference_id
reference_type
scores
url http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7397.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7397.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-7397
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.51521
published_at 2026-04-01T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.51662
published_at 2026-04-16T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.51658
published_at 2026-04-11T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.51637
published_at 2026-04-12T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.5162
published_at 2026-04-13T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51572
published_at 2026-04-02T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.51598
published_at 2026-04-04T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.51559
published_at 2026-04-07T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51613
published_at 2026-04-08T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.51609
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-7397
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
48
reference_url https://github.com/ImageMagick/ImageMagick/issues/1454
reference_id
reference_type
scores
url https://github.com/ImageMagick/ImageMagick/issues/1454
49
reference_url https://www.debian.org/security/2020/dsa-4712
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4712
50
reference_url http://www.securityfocus.com/bid/106847
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106847
51
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1672564
reference_id 1672564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1672564
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-7397
reference_id CVE-2019-7397
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-7397
61
reference_url https://access.redhat.com/errata/RHSA-2020:1180
reference_id RHSA-2020:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1180
62
reference_url https://usn.ubuntu.com/4034-1/
reference_id USN-4034-1
reference_type
scores
url https://usn.ubuntu.com/4034-1/
63
reference_url https://usn.ubuntu.com/7068-1/
reference_id USN-7068-1
reference_type
scores
url https://usn.ubuntu.com/7068-1/
fixed_packages
0
url pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=x86&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=x86&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.32-r0%3Farch=x86&distroversion=v3.18&reponame=community
aliases CVE-2019-7397
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qad-mewf-8khz
3
url VCID-am38-b487-k7bn
vulnerability_id VCID-am38-b487-k7bn
summary In GraphicsMagick 1.3.31, the ReadDIBImage function of coders/dib.c has a vulnerability allowing a crash and denial of service via a dib file that is crafted to appear with direct pixel values and also colormapping (which is not available beyond 8-bits/sample), and therefore lacks indexes initialization.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20189
reference_id
reference_type
scores
0
value 0.01686
scoring_system epss
scoring_elements 0.82137
published_at 2026-04-01T12:55:00Z
1
value 0.01686
scoring_system epss
scoring_elements 0.8215
published_at 2026-04-02T12:55:00Z
2
value 0.01686
scoring_system epss
scoring_elements 0.82172
published_at 2026-04-04T12:55:00Z
3
value 0.01686
scoring_system epss
scoring_elements 0.82169
published_at 2026-04-07T12:55:00Z
4
value 0.01686
scoring_system epss
scoring_elements 0.82195
published_at 2026-04-08T12:55:00Z
5
value 0.01686
scoring_system epss
scoring_elements 0.82202
published_at 2026-04-09T12:55:00Z
6
value 0.01686
scoring_system epss
scoring_elements 0.82222
published_at 2026-04-11T12:55:00Z
7
value 0.01686
scoring_system epss
scoring_elements 0.82214
published_at 2026-04-12T12:55:00Z
8
value 0.01686
scoring_system epss
scoring_elements 0.82208
published_at 2026-04-13T12:55:00Z
9
value 0.01686
scoring_system epss
scoring_elements 0.82245
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20189
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20189
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916752
reference_id 916752
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916752
3
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
4
reference_url https://usn.ubuntu.com/5974-1/
reference_id USN-5974-1
reference_type
scores
url https://usn.ubuntu.com/5974-1/
fixed_packages
0
url pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=x86&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=x86&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.32-r0%3Farch=x86&distroversion=v3.18&reponame=community
aliases CVE-2018-20189
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-am38-b487-k7bn
4
url VCID-qh3z-vna7-87h2
vulnerability_id VCID-qh3z-vna7-87h2
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12921
reference_id
reference_type
scores
0
value 0.05729
scoring_system epss
scoring_elements 0.90456
published_at 2026-04-16T12:55:00Z
1
value 0.05729
scoring_system epss
scoring_elements 0.90448
published_at 2026-04-11T12:55:00Z
2
value 0.05729
scoring_system epss
scoring_elements 0.90447
published_at 2026-04-12T12:55:00Z
3
value 0.05729
scoring_system epss
scoring_elements 0.904
published_at 2026-04-01T12:55:00Z
4
value 0.05729
scoring_system epss
scoring_elements 0.90404
published_at 2026-04-02T12:55:00Z
5
value 0.05729
scoring_system epss
scoring_elements 0.90416
published_at 2026-04-04T12:55:00Z
6
value 0.05729
scoring_system epss
scoring_elements 0.9042
published_at 2026-04-07T12:55:00Z
7
value 0.05729
scoring_system epss
scoring_elements 0.90434
published_at 2026-04-08T12:55:00Z
8
value 0.05729
scoring_system epss
scoring_elements 0.9044
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12921
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12921
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10938
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md
reference_id
reference_type
scores
url https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md
7
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00026.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/03/msg00026.html
8
reference_url https://www.debian.org/security/2020/dsa-4675
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4675
9
reference_url http://www.graphicsmagick.org/
reference_id
reference_type
scores
url http://www.graphicsmagick.org/
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-12921
reference_id CVE-2019-12921
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-12921
17
reference_url https://usn.ubuntu.com/USN-5190-1/
reference_id USN-USN-5190-1
reference_type
scores
url https://usn.ubuntu.com/USN-5190-1/
fixed_packages
0
url pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=x86&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=x86&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.32-r0%3Farch=x86&distroversion=v3.18&reponame=community
aliases CVE-2019-12921
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qh3z-vna7-87h2
5
url VCID-wwqv-tpq5-dqgs
vulnerability_id VCID-wwqv-tpq5-dqgs
summary coders/xwd.c in GraphicsMagick 1.3.31 allows attackers to cause a denial of service (floating-point exception and application crash) by crafting an XWD image file, a different vulnerability than CVE-2019-11008 and CVE-2019-11009.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11474
reference_id
reference_type
scores
0
value 0.0298
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-01T12:55:00Z
1
value 0.0298
scoring_system epss
scoring_elements 0.86472
published_at 2026-04-02T12:55:00Z
2
value 0.0298
scoring_system epss
scoring_elements 0.8649
published_at 2026-04-07T12:55:00Z
3
value 0.0298
scoring_system epss
scoring_elements 0.86509
published_at 2026-04-08T12:55:00Z
4
value 0.0298
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-09T12:55:00Z
5
value 0.0298
scoring_system epss
scoring_elements 0.86533
published_at 2026-04-11T12:55:00Z
6
value 0.0298
scoring_system epss
scoring_elements 0.8653
published_at 2026-04-12T12:55:00Z
7
value 0.0298
scoring_system epss
scoring_elements 0.86525
published_at 2026-04-13T12:55:00Z
8
value 0.0298
scoring_system epss
scoring_elements 0.8654
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11474
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11474
2
reference_url https://usn.ubuntu.com/4207-1/
reference_id USN-4207-1
reference_type
scores
url https://usn.ubuntu.com/4207-1/
fixed_packages
0
url pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=x86&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=x86&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.32-r0%3Farch=x86&distroversion=v3.18&reponame=community
aliases CVE-2019-11474
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wwqv-tpq5-dqgs
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.32-r0%3Farch=x86&distroversion=v3.18&reponame=community