{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T14:33:16.467","vulnerabilities":[{"cve":{"id":"CVE-2008-6621","sourceIdentifier":"cve@mitre.org","published":"2009-04-06T21:30:00.170","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in GraphicsMagick before 1.2.3 allows remote attackers to cause a denial of service (crash) via unspecified vectors in DPX images.  NOTE: some of these details are obtained from third party information."},{"lang":"es","value":"Vulnerabilidad no especificada en la herramienta de procesamiento de imágenes GraphicsMagick v1.2.3 que permite a usuarios remotos causar una denegación de servicio (caída de la aplicación) a través de vectores de ataque no especificados en las imagenes DPX. NOTA: algunos de estos detalles han sido obtenidos de información procedente de terceros."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*","matchCriteriaId":"05EE52FC-600E-4A8A-BB0D-96DD200C8DB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*","matchCriteriaId":"7E3834A3-8A7E-4914-A20C-EE694150D044"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"2E54C88D-035D-43F7-8D26-F07C9DC24D8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"DEDB13AA-2AD3-4FFE-9851-53BB0531BC92"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"071499F5-8FB0-4EE9-B816-6514AF6C17AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*","matchCriteriaId":"F96A991C-67A7-4C36-99C4-846BD2175F5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.5:*:*:*:*:*:*:*","matchCriteriaId":"8AC0F79E-4DD6-4EF9-82E1-68DC8EB7EF5E"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*","matchCriteriaId":"BD7E2792-B4BC-4C71-990D-0B7462919568"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*","matchCriteriaId":"10F2FD22-4058-45D6-8352-0AA6382746C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"E4F41DBD-6F06-40DC-A722-EC51B9ACC07D"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*","matchCriteriaId":"96CA70E0-2533-417A-B8C4-F687BF256691"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*","matchCriteriaId":"1BF103AE-6F15-4F2D-A375-F2AF91171EE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*","matchCriteriaId":"65929D5C-31B1-4A70-8E9C-AC6749332480"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*","matchCriteriaId":"BC45DB14-ABB2-4116-930D-349A81CDB982"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*","matchCriteriaId":"0573F148-0204-4F6B-A7B7-12DDF61C7383"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*","matchCriteriaId":"7D259740-FE5A-4D28-B554-FD176F9BD1FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*","matchCriteriaId":"489040F9-1992-4030-9AFC-9855CFB8C1EB"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*","matchCriteriaId":"A9942F4B-6608-4828-988C-2F76EB73CC48"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*","matchCriteriaId":"12D4C9D5-2A4F-4263-943C-1F46E0BB802E"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*","matchCriteriaId":"FAA39999-2648-4EBB-A9CD-15FBE9900E32"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*","matchCriteriaId":"4AD2742D-41F6-43F4-B90B-B75D54E08326"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.13:*:*:*:*:*:*:*","matchCriteriaId":"2755909D-D83F-4810-824D-7514EE501AA6"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.14:*:*:*:*:*:*:*","matchCriteriaId":"5763F6B5-C4FB-4792-B5D8-058B314D177E"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.2:*:*:*:*:*:*:*","matchCriteriaId":"634E509D-7E46-43EE-BE38-7C3A7690761D"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"01E41E1B-BE16-4581-A503-CEC993D11A71"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.2:*:*:*:*:*:*:*","matchCriteriaId":"1B3C34D3-56B0-4539-8361-4EEBBD878777"},{"vulnerable":true,"criteria":"cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.18:*:*:*:*:*:*:*","matchCriteriaId":"C656F3BD-3FB8-484C-8853-853C47BDFCE1"}]}]}],"references":[{"url":"http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/dpx.c","source":"cve@mitre.org"},{"url":"http://osvdb.org/46258","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/30549","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://sourceforge.net/project/shownotes.php?release_id=604837","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2008/1767","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/dpx.c","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://osvdb.org/46258","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/30549","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://sourceforge.net/project/shownotes.php?release_id=604837","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2008/1767","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}