{"url":"http://public2.vulnerablecode.io/api/packages/992992?format=json","purl":"pkg:apk/alpine/graphicsmagick@1.3.25-r0?arch=loongarch64&distroversion=v3.23&reponame=community","type":"apk","namespace":"alpine","name":"graphicsmagick","version":"1.3.25-r0","qualifiers":{"arch":"loongarch64","distroversion":"v3.23","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.3.25-r2","latest_non_vulnerable_version":"1.3.38-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92964?format=json","vulnerability_id":"VCID-mqgj-96wb-3ka2","summary":"The Utah RLE reader in GraphicsMagick before 1.3.25 allows remote attackers to cause a denial of service (CPU consumption or large memory allocations) via vectors involving the header information and the file size.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7448","reference_id":"","reference_type":"","scores":[{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88682","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.886","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88609","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88625","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88646","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.8865","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88655","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88668","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88678","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04138","scoring_system":"epss","scoring_elements":"0.88683","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7448"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/992992?format=json","purl":"pkg:apk/alpine/graphicsmagick@1.3.25-r0?arch=loongarch64&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.25-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2016-7448"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mqgj-96wb-3ka2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92965?format=json","vulnerability_id":"VCID-n7z7-zq3w-57cf","summary":"The TIFFGetField function in coders/tiff.c in GraphicsMagick 1.3.24 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a file containing an \"unterminated\" string.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7449","reference_id":"","reference_type":"","scores":[{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87178","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87084","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87112","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87126","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87133","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87146","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87136","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87157","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87153","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03259","scoring_system":"epss","scoring_elements":"0.87172","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7449","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7449"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/992992?format=json","purl":"pkg:apk/alpine/graphicsmagick@1.3.25-r0?arch=loongarch64&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.25-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2016-7449"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7z7-zq3w-57cf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92963?format=json","vulnerability_id":"VCID-rj8k-p2xg-6fcs","summary":"Heap-based buffer overflow in the EscapeParenthesis function in GraphicsMagick before 1.3.25 allows remote attackers to have unspecified impact via unknown vectors.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7447","reference_id":"","reference_type":"","scores":[{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83834","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83695","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83726","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83749","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83772","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83795","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83822","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.8383","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7447"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7447","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7447"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/992992?format=json","purl":"pkg:apk/alpine/graphicsmagick@1.3.25-r0?arch=loongarch64&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.25-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2016-7447"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rj8k-p2xg-6fcs"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/graphicsmagick@1.3.25-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community"}