imagemagick vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the imagemagick package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Write

<7.1.0.47-r0
  • M
Use After Free

<7.1.1.21-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Divide By Zero

<7.0.8.56-r0
  • H
Use After Free

<7.0.8.56-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.56-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Integer Overflow or Wraparound

<7.0.8.53-r0
  • M
Divide By Zero

<7.0.8.56-r0
  • M
Use After Free

<7.0.8.44-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.44-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • C
Out-of-bounds Write

<7.0.8.44-r0
  • L
Exposure of Resource to Wrong Sphere

<7.1.0.10-r0
  • H
Memory Leak

<7.1.0.0-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Use After Free

<7.0.8.44-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • H
Use After Free

<7.0.8.62-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Divide By Zero

<7.0.8.44-r0
  • M
Out-of-bounds Read

<7.0.8.44-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • H
Use of Uninitialized Resource

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.38-r0
  • M
Memory Leak

<7.0.8.53-r0
  • L
Memory Leak

<7.0.11.9-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • H
XML Injection

<7.0.10.42-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • H
Out-of-bounds Read

<7.0.8.44-r0
  • M
Improper Resource Shutdown or Release

<7.1.0.52-r0
  • C
Use After Free

<7.0.9.7-r0
  • M
Out-of-bounds Read

<7.0.10.0-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
CVE-2022-44268

<7.1.0.52-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Integer Overflow or Wraparound

<7.0.10.31-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • H
Integer Overflow or Wraparound

<7.0.10.31-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • C
Out-of-bounds Read

<7.0.8.44-r0
  • M
Out-of-bounds Read

<7.0.8.44-r0
  • M
Out-of-bounds Write

<7.1.0.30-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • M
Memory Leak

<7.0.8.38-r0
  • H
Use After Free

<7.1.0.30-r0
  • M
Reachable Assertion

<7.1.0.30-r0
  • H
Out-of-bounds Read

<7.1.0.24-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • M
Divide By Zero

<7.0.10.57-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • M
Integer Overflow or Wraparound

<7.0.10.57-r0
  • L
Divide By Zero

<7.0.10.35-r0
  • H
Incorrect Type Conversion or Cast

<7.0.10.31-r0
  • H
Out-of-bounds Read

<7.0.10.18-r0
  • H
Buffer Overflow

<7.0.10.31-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • H
Information Exposure

<7.0.11.1-r0
  • H
Integer Overflow or Wraparound

<7.0.11.1-r0
  • H
Out-of-bounds Read

<7.0.8.38-r0
  • H
Out-of-bounds Write

<7.0.10.8-r0
  • M
NULL Pointer Dereference

<7.0.10.31-r0