imagemagick vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the imagemagick package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Infinite loop

[0,)
  • L
Incorrect Calculation of Buffer Size

[0,)
  • L
Incorrect Calculation of Buffer Size

[0,)
  • M
Use After Free

[0,)
  • H
Division by zero

[0,)
  • M
Heap-based Buffer Overflow

[0,)
  • M
Buffer Overflow

[0,)
  • M
Use After Free

[0,)
  • M
Out-of-bounds Read

[0,)
  • H
Command Injection

[0,)
  • H
Remote Code Execution (RCE)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[0,)
  • H
Buffer Overflow

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Arbitrary Code Execution

[0,)
  • M
Denial of Service (DoS)

[0,)
  • H
Memory Leak

[0,)
  • M
Improper Input Validation

[0,)
  • M
Improper Input Validation

[0,)
  • H
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[0,)
  • H
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Improper Access Control

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Memory Leak

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
NULL Pointer Dereference

[0,)
  • C
NULL Pointer Dereference

[0,)
  • H
Divide By Zero

[0,)
  • M
Arbitrary Code Execution

[0,)
  • H
Resource Management Errors

[0,)
  • H
Arbitrary Code Execution

[0,)
  • H
Out-of-bounds Read

[0,)
  • M
Information Exposure

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Out-of-bounds Read

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Out-of-bounds Read

[0,)
  • C
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Denial of Service (DoS)

[0,)
  • C
Denial of Service (DoS)

[0,)
  • H
Improper Initialization

[0,)
  • H
Improper Access Control

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Heap-based Buffer Overflow

[0,)
  • H
Use After Free

[0,)
  • M
Buffer Overflow

[0,)