imagemagick vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the imagemagick package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Use After Free

<7.1.1.13-r1
  • M
CVE-2022-44268

<7.1.0.52-r0
  • M
Improper Resource Shutdown or Release

<7.1.0.52-r0
  • H
Use After Free

<7.1.0.30-r0
  • M
Out-of-bounds Write

<7.1.0.47-r0
  • M
Out-of-bounds Write

<7.1.0.30-r0
  • M
Reachable Assertion

<7.1.0.30-r0
  • H
Out-of-bounds Read

<7.1.0.24-r0
  • L
Memory Leak

<7.0.11.9-r0
  • M
Integer Overflow or Wraparound

<7.0.10.57-r0
  • H
Integer Overflow or Wraparound

<7.0.10.31-r0
  • M
NULL Pointer Dereference

<7.0.10.31-r0
  • H
Buffer Overflow

<7.0.10.31-r0
  • H
Incorrect Type Conversion or Cast

<7.0.10.31-r0
  • H
Integer Overflow or Wraparound

<7.0.10.31-r0
  • L
Exposure of Resource to Wrong Sphere

<7.1.0.10-r0
  • H
Memory Leak

<7.1.0.0-r0
  • H
Information Exposure

<7.0.11.1-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • H
Integer Overflow or Wraparound

<7.0.11.1-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • M
Divide By Zero

<7.0.10.57-r0
  • L
Divide By Zero

<7.0.10.35-r0
  • H
XML Injection

<7.0.10.42-r0
  • H
Out-of-bounds Write

<7.0.10.8-r0
  • M
Out-of-bounds Read

<7.0.10.0-r0
  • H
Out-of-bounds Read

<7.0.10.18-r0
  • C
Use After Free

<7.0.9.7-r0
  • C
Out-of-bounds Read

<7.0.8.44-r0
  • C
Out-of-bounds Write

<7.0.8.44-r0
  • M
Use After Free

<7.0.8.44-r0
  • H
Use After Free

<7.0.8.62-r0
  • M
Out-of-bounds Read

<7.0.8.44-r0
  • H
Out-of-bounds Write

<7.0.8.56-r0
  • H
Use After Free

<7.0.8.56-r0
  • H
Use After Free

<7.0.8.44-r0
  • M
Out-of-bounds Read

<7.0.8.44-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • M
Divide By Zero

<7.0.8.56-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Integer Overflow or Wraparound

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • M
Divide By Zero

<7.0.8.56-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Use of Uninitialized Resource

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.44-r0
  • H
Out-of-bounds Read

<7.0.8.44-r0
  • M
Divide By Zero

<7.0.8.44-r0
  • H
Out-of-bounds Read

<7.0.8.38-r0
  • M
Memory Leak

<7.0.8.38-r0
  • H
Out-of-bounds Write

<7.0.8.38-r0