graphicsmagick vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the graphicsmagick package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Information Exposure

<1.3.32-r0
  • M
Out-of-Bounds

<1.3.30-r0
  • H
Out-of-bounds Write

<1.3.35-r2
  • M
Out-of-bounds Write

<1.3.32-r0
  • H
Out-of-bounds Read

<1.3.25-r0
  • M
Out-of-bounds Read

<1.3.32-r0
  • M
Improper Input Validation

<1.3.32-r0
  • M
Out-of-Bounds

<1.3.26-r2
  • C
Integer Overflow or Wraparound

<1.3.35-r0
  • H
Resource Management Errors

<1.3.25-r0
  • M
Divide By Zero

<1.3.29-r0
  • H
Use After Free

<1.3.26-r2
  • C
Out-of-Bounds

<1.3.25-r0
  • M
Out-of-Bounds

<1.3.26-r2
  • M
Out-of-Bounds

<1.3.26-r5
  • H
Out-of-bounds Read

<1.3.26-r2
  • H
Out-of-bounds Read

<1.3.26-r2
  • H
NULL Pointer Dereference

<1.3.26-r2
  • M
Out-of-bounds Read

<1.3.26-r2
  • M
Out-of-Bounds

<1.3.26-r5
  • H
Use After Free

<1.3.26-r5
  • M
Missing Release of Resource after Effective Lifetime

<1.3.26-r5
  • H
Out-of-Bounds

<1.3.28-r0
  • M
NULL Pointer Dereference

<1.3.26-r5
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.3.28-r0
  • M
Excessive Iteration

<1.3.26-r3
  • M
CVE-2017-13775

<1.3.26-r3
  • M
Excessive Iteration

<1.3.26-r3
  • M
NULL Pointer Dereference

<1.3.27-r0
  • H
Use After Free

<1.3.27-r0
  • M
NULL Pointer Dereference

<1.3.27-r0
  • M
Allocation of Resources Without Limits or Throttling

<1.3.27-r0
  • M
Allocation of Resources Without Limits or Throttling

<1.3.27-r0
  • H
Out-of-bounds Read

<1.3.27-r0
  • H
Out-of-bounds Read

<1.3.27-r0
  • H
Out-of-bounds Read

<1.3.27-r0
  • H
Out-of-Bounds

<1.3.27-r0
  • H
Out-of-bounds Read

<1.3.27-r0
  • H
NULL Pointer Dereference

<1.3.27-r0
  • H
Out-of-bounds Read

<1.3.27-r0
  • H
Out-of-Bounds

<1.3.27-r0
  • H
Out-of-bounds Read

<1.3.27-r0
  • H
Improper Input Validation

<1.3.27-r0
  • H
Use After Free

<1.3.27-r0
  • M
Information Exposure

<1.3.27-r0
  • H
Out-of-Bounds

<1.3.27-r0
  • M
Information Exposure

<1.3.27-r0
  • H
NULL Pointer Dereference

<1.3.27-r0
  • M
Use After Free

<1.3.27-r0
  • M
Reachable Assertion

<1.3.27-r0
  • M
NULL Pointer Dereference

<1.3.27-r0
  • M
Integer Underflow

<1.3.27-r0
  • M
Out-of-bounds Read

<1.3.27-r0
  • M
Out-of-bounds Read

<1.3.27-r0
  • M
NULL Pointer Dereference

<1.3.27-r0
  • H
Improper Input Validation

<1.3.27-r0
  • M
Missing Release of Resource after Effective Lifetime

<1.3.27-r0
  • C
Out-of-Bounds

<1.3.27-r0
  • C
Missing Release of Resource after Effective Lifetime

<1.3.27-r0
  • M
Missing Release of Resource after Effective Lifetime

<1.3.27-r0
  • M
Out-of-bounds Read

<1.3.27-r0
  • H
Improper Input Validation

<1.3.27-r0
  • C
NULL Pointer Dereference

<1.3.27-r0
  • H
Improper Input Validation

<1.3.27-r0
  • C
Out-of-Bounds

<1.3.27-r0
  • H
Use After Free

<1.3.25-r2
  • M
Resource Exhaustion

<1.3.26-r0
  • M
Resource Exhaustion

<1.3.27-r0
  • C
Double Free

<1.3.27-r0
  • M
Out-of-Bounds

<1.3.26-r0
  • M
Resource Exhaustion

<1.3.26-r0
  • M
Out-of-bounds Read

<1.3.26-r0
  • M
Improper Input Validation

<1.3.26-r0
  • H
Out-of-bounds Read

<1.3.26-r0
  • H
Out-of-Bounds

<1.3.26-r0
  • H
Out-of-Bounds

<1.3.26-r0
  • H
NULL Pointer Dereference

<1.3.26-r0
  • C
Out-of-Bounds

<1.3.26-r0
  • H
Out-of-Bounds

<1.3.26-r0
  • H
Memory Leak

<1.3.32-r0
  • M
Missing Release of Resource after Effective Lifetime

<1.3.32-r0