imagemagick vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the imagemagick package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Heap-based Buffer Overflow

<7.1.2.12-r0
  • H
Uncontrolled Recursion

<7.1.2.12-r0
  • H
Integer Overflow or Wraparound

<7.1.2.12-r0
  • L
Out-of-bounds Read

<7.1.2.12-r0
  • M
Uncontrolled Recursion

<7.1.2.12-r0
  • M
Out-of-bounds Write

<7.1.0.30-r0
  • M
Reachable Assertion

<7.1.0.30-r0
  • H
Out-of-bounds Read

<7.1.0.24-r0
  • H
Integer Overflow or Wraparound

<7.1.2.8-r0
  • M
Use After Free

<7.1.1.21-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Use After Free

<7.0.8.56-r0
  • M
Divide By Zero

<7.0.8.56-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • M
Memory Leak

<7.0.8.53-r0
  • M
Out-of-bounds Read

<7.0.8.44-r0
  • H
Out-of-bounds Read

<7.0.8.44-r0
  • M
Out-of-bounds Write

<7.1.0.47-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Use After Free

<7.1.0.30-r0
  • H
Out-of-bounds Write

<7.0.8.38-r0
  • M
Divide By Zero

<7.0.8.44-r0
  • C
Out-of-bounds Read

<7.0.8.44-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • L
Exposure of Resource to Wrong Sphere

<7.1.0.10-r0
  • H
Memory Leak

<7.1.0.0-r0
  • M
Improper Resource Shutdown or Release

<7.1.0.52-r0
  • M
Out-of-Bounds

<7.1.2.8-r0
  • M
CVE-2022-44268

<7.1.0.52-r0
  • M
Memory Leak

<7.0.8.38-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Use After Free

<7.0.8.62-r0
  • H
Integer Overflow or Wraparound

<7.0.10.31-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • H
Buffer Overflow

<7.0.10.31-r0
  • C
Use After Free

<7.0.9.7-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Integer Overflow or Wraparound

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Use of Uninitialized Resource

<7.0.8.53-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Divide By Zero

<7.0.8.56-r0
  • H
Out-of-bounds Write

<7.0.8.56-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.44-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • M
Out-of-bounds Read

<7.0.8.44-r0
  • H
Out-of-bounds Write

<7.0.8.53-r0
  • M
Use After Free

<7.0.8.44-r0
  • M
Memory Leak

<7.0.8.53-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • H
Use After Free

<7.0.8.44-r0
  • C
Out-of-bounds Write

<7.0.8.44-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • H
Out-of-bounds Read

<7.0.8.44-r0
  • M
Missing Release of Resource after Effective Lifetime

<7.0.8.38-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • L
Memory Leak

<7.0.11.9-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • H
XML Injection

<7.0.10.42-r0
  • L
Divide By Zero

<7.0.10.35-r0
  • H
Incorrect Type Conversion or Cast

<7.0.10.31-r0
  • H
Out-of-bounds Read

<7.0.8.53-r0
  • H
Out-of-bounds Read

<7.0.8.38-r0
  • H
Out-of-bounds Read

<7.0.10.18-r0
  • M
Out-of-bounds Read

<7.0.10.0-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • M
Divide By Zero

<7.0.10.57-r0
  • H
Integer Overflow or Wraparound

<7.0.11.1-r0
  • H
Information Exposure

<7.0.11.1-r0
  • M
Integer Overflow or Wraparound

<7.0.10.57-r0
  • H
Divide By Zero

<7.0.11.1-r0
  • M
Divide By Zero

<7.0.11.1-r0
  • H
Out-of-bounds Write

<7.0.10.8-r0
  • M
NULL Pointer Dereference

<7.0.10.31-r0
  • H
Integer Overflow or Wraparound

<7.0.10.31-r0