Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

graphicsmagick

About This Vendor

graphicsmagick is a technology vendor producing software and infrastructure products. As a software provider, graphicsmagick's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of graphicsmagick's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 121 known vulnerabilities from graphicsmagick. This includes 15 critical-severity issues and 49 high-severity issues that represent significant risk. These vulnerabilities affect 23 distinct products across graphicsmagick's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2005 through 2025, indicating decades of continuous security attention and research. Organizations deploying graphicsmagick products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2005-1275 2005-04-25 2025-04-03 - 5.0 Likely
CVE-2005-0005 2005-05-02 2025-04-03 - 7.5 Likely
CVE-2005-1739 2005-05-24 2025-04-03 - 5.0 Likely
CVE-2006-5456 2006-10-23 2025-04-09 - 5.1 Unknown
CVE-2007-0770 2007-02-12 2025-04-09 - 9.3 Likely
CVE-2008-3134 2008-07-10 2025-04-09 - 5.0 Likely
CVE-2008-6070 2009-02-10 2025-04-09 - 9.3 Likely
CVE-2008-6071 2009-02-10 2025-04-09 - 10.0 Likely
CVE-2008-6072 2009-02-10 2025-04-09 - 5.0 Likely
CVE-2008-6621 2009-04-06 2025-04-09 - 7.8 Likely
CVE-2012-3438 2012-08-07 2025-04-11 - 4.3 Likely
CVE-2013-4589 2013-11-23 2025-04-11 - 4.3 Likely
CVE-2016-5118 2016-06-10 2025-04-12 9.8 10.0 Likely
CVE-2015-8808 2016-07-13 2025-04-12 5.5 4.3 Likely
CVE-2016-7996 2017-01-18 2025-04-20 9.8 7.5 Likely
CVE-2016-7997 2017-01-18 2025-04-20 7.5 5.0 Likely
CVE-2016-2317 2017-02-03 2025-04-20 5.5 4.3 Likely
CVE-2016-2318 2017-02-03 2025-04-20 5.5 4.3 Likely
CVE-2016-5241 2017-02-03 2025-04-20 5.5 4.3 Likely
CVE-2016-7446 2017-02-06 2025-04-20 9.8 7.5 Likely
CVE-2016-7447 2017-02-06 2025-04-20 9.8 7.5 Likely
CVE-2016-7448 2017-02-06 2025-04-20 7.5 7.8 Likely
CVE-2016-7449 2017-02-06 2025-04-20 7.5 5.0 Likely
CVE-2016-7800 2017-02-06 2025-04-20 7.5 5.0 Likely
CVE-2016-8682 2017-02-15 2025-04-20 7.5 5.0 Likely
CVE-2016-8683 2017-02-15 2025-04-20 7.8 6.8 Likely
CVE-2016-8684 2017-02-15 2025-04-20 7.8 6.8 Likely
CVE-2016-5240 2017-02-27 2025-04-20 5.5 4.3 Likely
CVE-2016-9830 2017-03-01 2025-04-20 5.5 4.3 Likely
CVE-2017-6335 2017-03-14 2025-04-20 5.5 4.3 Likely
CVE-2017-9098 2017-05-19 2025-04-20 7.5 5.0 Likely
CVE-2017-10794 2017-07-02 2025-04-20 5.5 4.3 Likely
CVE-2017-10799 2017-07-03 2025-04-20 5.5 4.3 Likely
CVE-2017-10800 2017-07-03 2025-04-20 5.5 4.3 Likely
CVE-2017-11102 2017-07-07 2025-04-20 7.5 5.0 Likely
CVE-2017-11139 2017-07-10 2025-04-20 9.8 7.5 Likely
CVE-2017-11140 2017-07-10 2025-04-20 5.5 7.1 Likely
CVE-2017-11403 2017-07-18 2025-04-20 8.8 6.8 Likely
CVE-2017-11636 2017-07-26 2025-04-20 9.8 7.5 Likely
CVE-2017-11637 2017-07-26 2025-04-20 9.8 7.5 Likely
CVE-2017-11638 2017-07-26 2025-04-20 8.8 6.8 Likely
CVE-2017-11641 2017-07-26 2025-04-20 9.8 7.5 Likely
CVE-2017-11642 2017-07-26 2025-04-20 8.8 6.8 Likely
CVE-2017-11643 2017-07-26 2025-04-20 9.8 7.5 Likely
CVE-2017-11722 2017-07-28 2025-04-20 6.5 4.3 Likely
CVE-2017-12935 2017-08-18 2025-04-20 8.8 6.8 Likely
CVE-2017-12936 2017-08-18 2025-04-20 8.8 6.8 Likely
CVE-2017-12937 2017-08-18 2025-04-20 8.8 6.8 Likely
CVE-2017-13063 2017-08-22 2025-04-20 6.5 4.3 Likely
CVE-2017-13064 2017-08-22 2025-04-20 6.5 4.3 Likely
CVE-2017-13065 2017-08-22 2025-04-20 6.5 4.3 Likely
CVE-2017-13066 2017-08-22 2025-04-20 6.5 4.3 Likely
CVE-2017-13147 2017-08-23 2025-04-20 8.8 6.8 Likely
CVE-2017-13648 2017-08-23 2025-04-20 6.5 4.3 Likely
CVE-2017-13736 2017-08-29 2025-04-20 6.5 4.3 Likely
CVE-2017-13737 2017-08-29 2025-04-20 6.5 4.3 Likely
CVE-2017-13775 2017-08-30 2025-04-20 6.5 7.1 Likely
CVE-2017-13776 2017-08-30 2025-04-20 6.5 7.1 Likely
CVE-2017-13777 2017-08-30 2025-04-20 6.5 7.1 Likely
CVE-2017-14042 2017-08-30 2025-04-20 6.5 4.3 Likely
CVE-2017-14103 2017-09-01 2025-04-20 8.8 6.8 Likely
CVE-2017-14165 2017-09-06 2025-04-20 6.5 4.3 Likely
CVE-2017-14314 2017-09-12 2025-04-20 6.5 4.3 Likely
CVE-2017-14504 2017-09-17 2025-04-20 6.5 4.3 Likely
CVE-2017-14649 2017-09-21 2025-04-20 5.5 4.3 Likely
CVE-2017-14733 2017-09-25 2025-04-20 6.5 4.3 Likely
CVE-2017-14994 2017-10-04 2025-04-20 6.5 4.3 Likely
CVE-2017-14997 2017-10-04 2025-04-20 6.5 7.1 Likely
CVE-2017-15238 2017-10-11 2025-04-20 8.8 6.8 Likely
CVE-2017-15277 2017-10-12 2025-04-20 6.5 4.3 Likely
CVE-2017-15930 2017-10-27 2025-04-20 8.8 6.8 Likely
CVE-2017-16352 2017-11-01 2025-04-20 8.8 6.8 Likely
CVE-2017-16353 2017-11-01 2025-04-20 6.5 4.3 Likely
CVE-2017-16545 2017-11-05 2025-04-20 8.8 6.8 Likely
CVE-2017-16547 2017-11-06 2025-04-20 8.8 6.8 Likely
CVE-2017-16669 2017-11-09 2025-04-20 8.8 6.8 Likely
CVE-2017-17498 2017-12-11 2025-04-20 8.8 6.8 Likely
CVE-2017-17500 2017-12-11 2025-04-20 8.8 6.8 Likely
CVE-2017-17501 2017-12-11 2025-04-20 8.8 6.8 Likely
CVE-2017-17502 2017-12-11 2025-04-20 8.8 6.8 Likely
CVE-2017-17503 2017-12-11 2025-04-20 8.8 6.8 Likely
CVE-2017-17782 2017-12-20 2025-04-20 8.8 6.8 Likely
CVE-2017-17783 2017-12-20 2025-04-20 7.5 5.1 Unknown
CVE-2017-17912 2017-12-27 2025-04-20 8.8 6.8 Likely
CVE-2017-17913 2017-12-27 2025-04-20 8.8 6.8 Likely
CVE-2017-17915 2017-12-27 2025-04-20 8.8 6.8 Likely
CVE-2018-5360 2018-01-14 2024-11-21 8.8 6.8 Likely
CVE-2018-5685 2018-01-14 2024-11-21 6.5 4.3 Likely
CVE-2018-6799 2018-02-07 2024-11-21 8.8 6.8 Likely
CVE-2017-18219 2018-03-05 2024-11-21 6.5 4.3 Likely
CVE-2017-18220 2018-03-05 2024-11-21 8.8 6.8 Likely
CVE-2017-18229 2018-03-14 2024-11-21 6.5 4.3 Likely
CVE-2017-18230 2018-03-14 2024-11-21 6.5 4.3 Likely
CVE-2017-18231 2018-03-14 2024-11-21 6.5 4.3 Likely
CVE-2018-9018 2018-03-25 2024-11-21 6.5 4.3 Likely
CVE-2018-18544 2018-10-21 2024-11-21 6.5 4.3 Likely
CVE-2018-20184 2018-12-17 2024-11-21 6.5 4.3 Likely
CVE-2018-20185 2018-12-17 2024-11-21 5.3 2.6 Unknown
CVE-2018-20189 2018-12-17 2024-11-21 6.5 4.3 Likely
CVE-2019-7397 2019-02-05 2024-11-21 7.5 5.0 Likely
CVE-2019-11005 2019-04-08 2024-11-21 9.8 7.5 Likely
CVE-2019-11006 2019-04-08 2024-11-21 9.1 6.4 Likely
CVE-2019-11007 2019-04-08 2024-11-21 8.1 5.8 Likely
CVE-2019-11008 2019-04-08 2024-11-21 8.8 6.8 Likely
CVE-2019-11009 2019-04-08 2024-11-21 8.1 5.8 Likely
CVE-2019-11010 2019-04-08 2024-11-21 6.5 4.3 Likely
CVE-2019-11473 2019-04-23 2024-11-21 6.5 4.3 Likely
CVE-2019-11474 2019-04-23 2024-11-21 6.5 4.3 Likely
CVE-2019-11505 2019-04-24 2024-11-21 8.8 6.8 Likely
CVE-2019-11506 2019-04-24 2024-11-21 8.8 6.8 Likely
CVE-2019-19950 2019-12-24 2024-11-21 9.8 7.5 Likely
CVE-2019-19951 2019-12-24 2024-11-21 9.8 7.5 Likely
CVE-2019-19953 2019-12-24 2024-11-21 9.1 6.4 Likely
CVE-2019-12921 2020-03-18 2024-11-21 6.5 4.3 Likely
CVE-2020-10938 2020-03-24 2024-11-21 9.8 7.5 Likely
CVE-2020-12672 2020-05-06 2024-11-21 7.5 5.0 Likely
CVE-2022-1270 2022-09-28 2025-05-21 7.8 - -
CVE-2020-21679 2023-08-22 2024-11-21 5.5 - -
CVE-2025-27795 2025-03-07 2026-01-29 4.3 - -
CVE-2025-27796 2025-03-07 2026-01-29 4.5 - -
CVE-2025-32460 2025-04-09 2026-01-29 4.0 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for graphicsmagick by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with graphicsmagick's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.