imagemagick vulnerabilities

Licenses: Unknown

Direct Vulnerabilities

Known vulnerabilities in the imagemagick package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Use After Free

[0,)
  • M
Use After Free

[0,)
  • M
Improper Encoding or Escaping of Output

[0,)
  • L
Out-of-bounds Read

[0,)
  • M
Out-of-bounds Read

[0,)
  • M
Buffer Over-read

[0,)
  • M
Missing Release of Memory after Effective Lifetime

[0,)
  • L
Buffer Over-read

[0,)
  • M
Missing Release of Memory after Effective Lifetime

[0,)
  • M
Integer Overflow or Wraparound

[0,)
  • H
Directory Traversal

[0,)
  • H
Infinite loop

[0,)
  • H
Allocation of Resources Without Limits or Throttling

[0,)
  • H
Out-of-bounds Read

[0,)
  • M
Division by zero

[0,)
  • M
NULL Pointer Dereference

[0,)
  • M
Integer Overflow or Wraparound

[0,)
  • H
Integer Overflow or Wraparound

[0,)
  • M
Arbitrary Code Injection

[0,)
  • M
Missing Release of Resource after Effective Lifetime

[0,)
  • M
Out-of-bounds Read

[0,)
  • H
Infinite loop

[0,)
  • H
Integer Overflow or Wraparound

[0,)
  • H
NULL Pointer Dereference

[0,)
  • M
Missing Release of Memory after Effective Lifetime

[0,)
  • M
Missing Release of Memory after Effective Lifetime

[0,)
  • H
Out-of-bounds Read

[0,)
  • M
Unchecked Input for Loop Condition

[0,)
  • M
Incomplete List of Disallowed Inputs

[0,)
  • M
Missing Release of Memory after Effective Lifetime

[0,)
  • M
Expired Pointer Dereference

[0,)
  • H
Off-by-one Error

[0,)
  • M
Expired Pointer Dereference

[0,)
  • M
Infinite loop

[0,)
  • H
Allocation of Resources Without Limits or Throttling

[0,)
  • M
Out-of-bounds Read

[0,)
  • M
Incorrect Calculation of Buffer Size

[0,)
  • M
Buffer Access with Incorrect Length Value

[0,)
  • M
Missing Release of Memory after Effective Lifetime

[0,)
  • M
Heap-based Buffer Overflow

[0,)
  • H
Stack-based Buffer Overflow

[0,)
  • H
Heap-based Buffer Overflow

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
NULL Pointer Dereference

[0,)
  • H
Release of Invalid Pointer or Reference

[0,)
  • H
Release of Invalid Pointer or Reference

[0,)
  • M
Infinite loop

[0,)
  • C
Integer Overflow or Wraparound

[0,)
  • M
Integer Overflow or Wraparound

[0,)
  • M
Uncontrolled Recursion

[0,)
  • M
Uncontrolled Recursion

[0,)
  • H
Out-of-bounds Read

[0,)
  • M
Division by zero

[0,)
  • M
Integer Overflow or Wraparound

[0,)
  • H
Out-of-bounds Write

[0,)
  • M
Heap-based Buffer Overflow

[0,)
  • H
Integer Overflow or Wraparound

[0,)
  • H
Use of Externally-Controlled Format String

[0,)
  • M
Division by zero

[0,)
  • H
Heap-based Buffer Overflow

[0,)
  • H
Integer Overflow or Wraparound

[0,)
  • M
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior

[0,)
  • M
Heap-based Buffer Overflow

[0,)
  • M
Out-of-bounds Read

[0,)
  • M
Off-by-one Error

[0,)
  • H
Buffer Underwrite (Buffer Underflow)

[0,)
  • H
Infinite loop

[0,)
  • L
Incorrect Calculation of Buffer Size

[0,)
  • L
Incorrect Calculation of Buffer Size

[0,)
  • M
Use After Free

[0,)
  • H
Division by zero

[0,)
  • M
Heap-based Buffer Overflow

[0,)
  • M
Buffer Overflow

[0,)
  • M
Use After Free

[0,)
  • M
Out-of-bounds Read

[0,)
  • H
Command Injection

[0,)
  • H
Remote Code Execution (RCE)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[0,)
  • H
Buffer Overflow

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Arbitrary Code Execution

[0,)
  • H
Memory Leak

[0,)
  • H
Denial of Service (DoS)

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Improper Access Control

[0,)
  • C
NULL Pointer Dereference

[0,)
  • H
Divide By Zero

[0,)
  • M
Arbitrary Code Execution

[0,)
  • H
Arbitrary Code Execution

[0,)
  • H
Out-of-bounds Read

[0,)
  • M
Out-of-Bounds

[0,)
  • C
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • H
Denial of Service (DoS)

[0,)
  • C
Denial of Service (DoS)

[0,)
  • H
Improper Access Control

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Heap-based Buffer Overflow

[0,)
  • H
Use After Free

[0,)
  • M
Buffer Overflow

[0,)