imagemagick vulnerabilities

Licenses: Unknown

Direct Vulnerabilities

Known vulnerabilities in the imagemagick package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Division by zero

[0,)
  • M
Integer Overflow or Wraparound

[0,)
  • H
Out-of-bounds Write

[0,)
  • M
Heap-based Buffer Overflow

[0,)
  • H
Integer Overflow or Wraparound

[0,)
  • H
Use of Externally-Controlled Format String

[0,)
  • M
Division by zero

[0,)
  • H
Heap-based Buffer Overflow

[0,)
  • H
Integer Overflow or Wraparound

[0,)
  • M
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior

[0,)
  • M
Heap-based Buffer Overflow

[0,)
  • M
Out-of-bounds Read

[0,)
  • M
Off-by-one Error

[0,)
  • H
Buffer Underwrite (Buffer Underflow)

[0,)
  • H
Infinite loop

[0,)
  • L
Incorrect Calculation of Buffer Size

[0,)
  • L
Incorrect Calculation of Buffer Size

[0,)
  • M
Use After Free

[0,)
  • H
Division by zero

[0,)
  • M
Heap-based Buffer Overflow

[0,)
  • M
Buffer Overflow

[0,)
  • M
Use After Free

[0,)
  • M
Out-of-bounds Read

[0,)
  • H
Command Injection

[0,)
  • H
Remote Code Execution (RCE)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[0,)
  • H
Buffer Overflow

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Arbitrary Code Execution

[0,)
  • H
Memory Leak

[0,)
  • H
Denial of Service (DoS)

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Improper Access Control

[0,)
  • C
NULL Pointer Dereference

[0,)
  • H
Divide By Zero

[0,)
  • M
Arbitrary Code Execution

[0,)
  • H
Arbitrary Code Execution

[0,)
  • H
Out-of-bounds Read

[0,)
  • M
Out-of-Bounds

[0,)
  • C
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Denial of Service (DoS)

[0,)
  • C
Denial of Service (DoS)

[0,)
  • H
Improper Access Control

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Heap-based Buffer Overflow

[0,)
  • H
Use After Free

[0,)
  • M
Buffer Overflow

[0,)