imagemagick vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the imagemagick package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Memory Leak

<7.1.0.0-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • C
Out-of-bounds Read

<7.0.8.44-r0
  • H
Out-of-bounds Read

<7.0.8.38-r0
  • M
Use After Free

<7.1.1.21-r0
  • M
Out-of-bounds Write

<7.1.0.47-r0
  • M
Out-of-bounds Write

<7.1.0.30-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • M
Reachable Assertion

<7.1.0.30-r0
  • H
Out-of-bounds Write

<7.0.8.56-r0
  • H
Use After Free

<7.1.0.30-r0
  • H
Incorrect Type Conversion or Cast

<7.0.10.31-r0
  • M
Divide By Zero

<7.0.8.56-r0
  • H
Integer Overflow or Wraparound

<7.0.11.1-r0
  • C
Use After Free

<7.0.9.7-r0
  • H
Buffer Overflow

<7.0.10.31-r0
  • H
Use After Free

<7.0.8.62-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Integer Overflow or Wraparound

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Use of Uninitialized Resource

<7.0.8.53-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Divide By Zero

<7.0.8.56-r0
  • H
Use After Free

<7.0.8.56-r0
  • M
Use After Free

<7.0.8.44-r0
  • M
Out-of-bounds Read

<7.0.8.44-r0
  • L
Memory Leak

<7.0.11.9-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • M
CVE-2022-44268

<7.1.0.52-r0
  • M
Improper Resource Shutdown or Release

<7.1.0.52-r0
  • L
Exposure of Resource to Wrong Sphere

<7.1.0.10-r0
  • M
Divide By Zero

<7.0.10.57-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • H
Out-of-bounds Read

<7.1.0.24-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • C
Out-of-bounds Write

<7.0.8.44-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Integer Overflow or Wraparound

<7.0.10.31-r0
  • M
Out-of-bounds Read

<7.0.8.44-r0
  • H
Out-of-bounds Read

<7.0.10.18-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Out-of-bounds Read

<7.0.10.0-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.38-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • M
Divide By Zero

<7.0.8.44-r0
  • M
Memory Leak

<7.0.8.38-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • H
Out-of-bounds Read

<7.0.8.44-r0
  • H
Out-of-bounds Read

<7.0.8.44-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • H
Use After Free

<7.0.8.44-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • H
Information Exposure

<7.0.11.1-r0
  • H
Integer Overflow or Wraparound

<7.0.10.31-r0
  • M
NULL Pointer Dereference

<7.0.10.31-r0
  • M
Integer Overflow or Wraparound

<7.0.10.57-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • H
Out-of-bounds Write

<7.0.10.8-r0
  • H
XML Injection

<7.0.10.42-r0
  • L
Divide By Zero

<7.0.10.35-r0