{"url":"http://public2.vulnerablecode.io/api/packages/977511?format=json","purl":"pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=s390x&distroversion=v3.17&reponame=community","type":"apk","namespace":"alpine","name":"graphicsmagick","version":"1.3.32-r0","qualifiers":{"arch":"s390x","distroversion":"v3.17","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.3.35-r0","latest_non_vulnerable_version":"1.3.35-r2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83047?format=json","vulnerability_id":"VCID-15mv-khzp-fqfk","summary":"ImageMagick: memory leak in WriteMSLImage of coders/msl.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18544.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18544.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18544","reference_id":"","reference_type":"","scores":[{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35516","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35718","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35743","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.3567","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35693","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35658","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35636","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35665","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35615","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35377","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35356","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35275","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1642614","reference_id":"1642614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1642614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1180","reference_id":"RHSA-2020:1180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1180"},{"reference_url":"https://usn.ubuntu.com/4034-1/","reference_id":"USN-4034-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4034-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/977511?format=json","purl":"pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=s390x&distroversion=v3.17&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.32-r0%3Farch=s390x&distroversion=v3.17&reponame=community"}],"aliases":["CVE-2018-18544"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-15mv-khzp-fqfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93899?format=json","vulnerability_id":"VCID-2e5h-jf8c-dudp","summary":"coders/xwd.c in GraphicsMagick 1.3.31 allows attackers to cause a denial of service (out-of-bounds read and application crash) by crafting an XWD image file, a different vulnerability than CVE-2019-11008 and CVE-2019-11009.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11473","reference_id":"","reference_type":"","scores":[{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79481","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79511","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79497","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79525","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79533","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79555","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79538","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79529","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.7956","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79558","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79563","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79595","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79601","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79616","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11473"},{"reference_url":"https://usn.ubuntu.com/4207-1/","reference_id":"USN-4207-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4207-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/977511?format=json","purl":"pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=s390x&distroversion=v3.17&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.32-r0%3Farch=s390x&distroversion=v3.17&reponame=community"}],"aliases":["CVE-2019-11473"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2e5h-jf8c-dudp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82838?format=json","vulnerability_id":"VCID-3qad-mewf-8khz","summary":"ImageMagick: Memory leak in the WritePDFImage function in coders/pdf.c","references":[{"reference_url":"http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1","reference_id":"","reference_type":"","scores":[],"url":"http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7397.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7397.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-7397","reference_id":"","reference_type":"","scores":[{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51521","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51566","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51649","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51599","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51605","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51572","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51598","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51613","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51609","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51637","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.5162","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51662","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51669","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-7397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82"},{"reference_url":"https://github.com/ImageMagick/ImageMagick/issues/1454","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/ImageMagick/ImageMagick/issues/1454"},{"reference_url":"https://www.debian.org/security/2020/dsa-4712","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2020/dsa-4712"},{"reference_url":"http://www.securityfocus.com/bid/106847","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106847"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1672564","reference_id":"1672564","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1672564"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-7397","reference_id":"CVE-2019-7397","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-7397"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1180","reference_id":"RHSA-2020:1180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1180"},{"reference_url":"https://usn.ubuntu.com/4034-1/","reference_id":"USN-4034-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4034-1/"},{"reference_url":"https://usn.ubuntu.com/7068-1/","reference_id":"USN-7068-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7068-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/977511?format=json","purl":"pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=s390x&distroversion=v3.17&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.32-r0%3Farch=s390x&distroversion=v3.17&reponame=community"}],"aliases":["CVE-2019-7397"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3qad-mewf-8khz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93672?format=json","vulnerability_id":"VCID-am38-b487-k7bn","summary":"In GraphicsMagick 1.3.31, the ReadDIBImage function of coders/dib.c has a vulnerability allowing a crash and denial of service via a dib file that is crafted to appear with direct pixel values and also colormapping (which is not available beyond 8-bits/sample), and therefore lacks indexes initialization.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20189","reference_id":"","reference_type":"","scores":[{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82137","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.8215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82172","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82169","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82195","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82202","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82214","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82245","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82246","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82268","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.8228","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82284","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20189"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916752","reference_id":"916752","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916752"},{"reference_url":"https://usn.ubuntu.com/4207-1/","reference_id":"USN-4207-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4207-1/"},{"reference_url":"https://usn.ubuntu.com/5974-1/","reference_id":"USN-5974-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5974-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/977511?format=json","purl":"pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=s390x&distroversion=v3.17&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.32-r0%3Farch=s390x&distroversion=v3.17&reponame=community"}],"aliases":["CVE-2018-20189"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-am38-b487-k7bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79197?format=json","vulnerability_id":"VCID-qh3z-vna7-87h2","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12921","reference_id":"","reference_type":"","scores":[{"value":"0.05729","scoring_system":"epss","scoring_elements":"0.90461","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05729","scoring_system":"epss","scoring_elements":"0.90466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05729","scoring_system":"epss","scoring_elements":"0.90465","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05729","scoring_system":"epss","scoring_elements":"0.904","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05729","scoring_system":"epss","scoring_elements":"0.90404","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05729","scoring_system":"epss","scoring_elements":"0.90416","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05729","scoring_system":"epss","scoring_elements":"0.9042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05729","scoring_system":"epss","scoring_elements":"0.90434","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05729","scoring_system":"epss","scoring_elements":"0.9044","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05729","scoring_system":"epss","scoring_elements":"0.90448","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05729","scoring_system":"epss","scoring_elements":"0.90447","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05729","scoring_system":"epss","scoring_elements":"0.90456","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05729","scoring_system":"epss","scoring_elements":"0.90455","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05729","scoring_system":"epss","scoring_elements":"0.90453","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10938"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00026.html"},{"reference_url":"https://www.debian.org/security/2020/dsa-4675","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2020/dsa-4675"},{"reference_url":"http://www.graphicsmagick.org/","reference_id":"","reference_type":"","scores":[],"url":"http://www.graphicsmagick.org/"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12921","reference_id":"CVE-2019-12921","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12921"},{"reference_url":"https://usn.ubuntu.com/USN-5190-1/","reference_id":"USN-USN-5190-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-5190-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/977511?format=json","purl":"pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=s390x&distroversion=v3.17&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.32-r0%3Farch=s390x&distroversion=v3.17&reponame=community"}],"aliases":["CVE-2019-12921"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qh3z-vna7-87h2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93900?format=json","vulnerability_id":"VCID-wwqv-tpq5-dqgs","summary":"coders/xwd.c in GraphicsMagick 1.3.31 allows attackers to cause a denial of service (floating-point exception and application crash) by crafting an XWD image file, a different vulnerability than CVE-2019-11008 and CVE-2019-11009.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11474","reference_id":"","reference_type":"","scores":[{"value":"0.0298","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0298","scoring_system":"epss","scoring_elements":"0.86472","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0298","scoring_system":"epss","scoring_elements":"0.8649","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0298","scoring_system":"epss","scoring_elements":"0.86509","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0298","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0298","scoring_system":"epss","scoring_elements":"0.86533","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0298","scoring_system":"epss","scoring_elements":"0.8653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0298","scoring_system":"epss","scoring_elements":"0.86525","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0298","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0298","scoring_system":"epss","scoring_elements":"0.86545","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0298","scoring_system":"epss","scoring_elements":"0.86538","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0298","scoring_system":"epss","scoring_elements":"0.86557","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0298","scoring_system":"epss","scoring_elements":"0.86565","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0298","scoring_system":"epss","scoring_elements":"0.86564","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11474"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11474"},{"reference_url":"https://usn.ubuntu.com/4207-1/","reference_id":"USN-4207-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4207-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/977511?format=json","purl":"pkg:apk/alpine/graphicsmagick@1.3.32-r0?arch=s390x&distroversion=v3.17&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.32-r0%3Farch=s390x&distroversion=v3.17&reponame=community"}],"aliases":["CVE-2019-11474"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wwqv-tpq5-dqgs"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.32-r0%3Farch=s390x&distroversion=v3.17&reponame=community"}