imagemagick vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the imagemagick package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
NULL Pointer Dereference

<7.1.2.15-r0
  • L
Allocation of Resources Without Limits or Throttling

<7.1.2.15-r0
  • L
Resource Exhaustion

<7.1.2.15-r0
  • C
Heap-based Buffer Overflow

<7.1.2.15-r0
  • H
Resource Exhaustion

<7.1.2.15-r0
  • L
Out-of-bounds Read

<7.1.2.12-r0
  • M
Arbitrary Code Injection

<7.1.2.15-r0
  • H
Integer Overflow or Wraparound

<7.1.2.12-r0
  • H
Stack-based Buffer Overflow

<7.1.2.15-r0
  • H
NULL Pointer Dereference

<7.1.2.15-r0
  • C
Out-of-bounds Read

<7.1.2.15-r0
  • M
Resource Exhaustion

<7.1.2.15-r0
  • L
Out-of-bounds Read

<7.1.2.15-r0
  • C
Out-of-bounds Read

<7.1.2.15-r0
  • H
Uncontrolled Recursion

<7.1.2.12-r0
  • L
NULL Pointer Dereference

<7.1.2.15-r0
  • C
Stack-based Buffer Overflow

<7.1.2.15-r0
  • M
Uncontrolled Recursion

<7.1.2.12-r0
  • C
Use After Free

<7.1.2.15-r0
  • L
Memory Leak

<7.1.2.15-r0
  • H
Divide By Zero

<7.1.2.15-r0
  • L
Memory Leak

<7.1.2.15-r0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<7.1.2.15-r0
  • L
Heap-based Buffer Overflow

<7.1.2.15-r0
  • H
Improper Access Control

<7.1.2.15-r0
  • H
Integer Overflow or Wraparound

<7.1.2.15-r0
  • C
Uncontrolled Recursion

<7.1.2.15-r0
  • H
Memory Leak

<7.1.2.15-r0
  • M
Heap-based Buffer Overflow

<7.1.2.15-r0
  • C
Out-of-bounds Write

<7.1.2.15-r0
  • M
Out-of-bounds Read

<7.1.2.15-r0
  • C
Heap-based Buffer Overflow

<7.1.2.15-r0
  • H
Memory Leak

<7.1.2.15-r0
  • L
Heap-based Buffer Overflow

<7.1.2.12-r0
  • L
Integer Overflow or Wraparound

<7.1.2.15-r0
  • M
Heap-based Buffer Overflow

<7.1.2.15-r0
  • C
Out-of-bounds Read

<7.1.2.8-r0
  • H
Out-of-bounds Read

<7.1.2.15-r0
  • H
Directory Traversal

<7.1.2.15-r0
  • H
Memory Leak

<7.1.2.15-r0
  • H
Integer Overflow or Wraparound

<7.1.2.8-r0
  • M
Out-of-Bounds

<7.1.2.8-r0
  • M
Divide By Zero

<7.0.8.56-r0
  • M
Divide By Zero

<7.0.8.56-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Divide By Zero

<7.0.8.44-r0
  • H
Integer Overflow or Wraparound

<7.0.11.1-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • H
Use After Free

<7.0.8.44-r0
  • H
Integer Overflow or Wraparound

<7.0.8.53-r0
  • M
Use After Free

<7.1.1.21-r0
  • H
Out-of-bounds Write

<7.0.8.56-r0
  • H
Out-of-bounds Read

<7.0.8.44-r0
  • M
Use After Free

<7.0.8.44-r0
  • M
Improper Resource Shutdown or Release

<7.1.0.52-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Out-of-bounds Read

<7.0.8.44-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • H
Incorrect Type Conversion or Cast

<7.0.10.31-r0
  • H
Use After Free

<7.0.8.56-r0
  • M
Out-of-bounds Read

<7.0.10.0-r0
  • M
NULL Pointer Dereference

<7.0.10.31-r0
  • M
CVE-2022-44268

<7.1.0.52-r0
  • M
Memory Leak

<7.0.8.38-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • H
Memory Leak

<7.1.0.0-r0
  • H
Out-of-bounds Read

<7.0.8.38-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Out-of-bounds Write

<7.1.0.47-r0
  • M
Memory Leak

<7.0.8.53-r0
  • L
Exposure of Resource to Wrong Sphere

<7.1.0.10-r0
  • H
Use of Uninitialized Resource

<7.0.8.53-r0
  • M
Integer Overflow or Wraparound

<7.0.10.57-r0
  • M
Divide By Zero

<7.0.10.57-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • C
Out-of-bounds Read

<7.0.8.44-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • M
Reachable Assertion

<7.1.0.30-r0
  • H
Use After Free

<7.1.0.30-r0
  • H
Use After Free

<7.0.8.62-r0
  • H
Out-of-bounds Write

<7.0.8.38-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • M
Memory Leak

<7.0.8.53-r0
  • C
Use After Free

<7.0.9.7-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Information Exposure

<7.0.11.1-r0
  • H
Out-of-bounds Read

<7.0.8.44-r0
  • C
Out-of-bounds Write

<7.0.8.44-r0
  • M
Out-of-bounds Read

<7.0.8.44-r0
  • L
Memory Leak

<7.0.11.9-r0
  • L
Divide By Zero

<7.0.10.35-r0
  • H
XML Injection

<7.0.10.42-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • M
Out-of-bounds Write

<7.1.0.30-r0
  • H
Out-of-bounds Read

<7.1.0.24-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.10.8-r0
  • H
Out-of-bounds Read

<7.0.10.18-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Buffer Overflow

<7.0.10.31-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • H
Integer Overflow or Wraparound

<7.0.10.31-r0
  • H
Integer Overflow or Wraparound

<7.0.10.31-r0