gimp vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://download.gimp.org|gimp package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-bounds Write

[,3.0.6)
  • H
Stack-based Buffer Overflow

[,3.0.6)
  • H
Heap-based Buffer Overflow

[,3.0.6)
  • H
Heap-based Buffer Overflow

[,3.0.6)
  • H
Integer Overflow or Wraparound

[,3.0.6)
  • H
Integer Overflow or Wraparound

[,3.0.6)
  • H
Out-of-bounds Write

[,3.0.4)
  • H
Integer Overflow or Wraparound

[,3.0.4)
  • H
Integer Overflow or Wraparound

[,3.1.2)
  • H
Out-of-bounds Write

[,3.0.0)
  • H
Stack-based Buffer Overflow

[,2.99.6)
  • H
Heap-based Buffer Overflow

[,3.0.0)
  • H
Use After Free

[,3.0.0)
  • H
Heap-based Buffer Overflow

[,2.10.36)
  • H
Integer Overflow or Wraparound

[,2.10.36)
  • H
Off-by-one Error

[,2.10.36)
  • H
Heap-based Buffer Overflow

[,2.10.36)
  • H
Denial of Service (DoS)

[1.3.20,2.10.32)
  • M
Denial of Service (DoS)

[,2.99.12)
  • M
Denial of Service (DoS)

[0,)
  • H
Out-of-bounds Read

[,2.10.0)
  • M
Out-of-Bounds

[,2.8.2)
  • M
Out-of-Bounds

[,2.6.11]
  • H
Denial of Service (DoS)

[0,)
  • C
Improper Input Validation

[,2.10.4)
  • H
Out-of-Bounds

[,2.7.0)
  • H
Out-of-bounds Read

[0,2.10.0)
  • M
Out-of-Bounds

[,2.6.10)
  • M
Out-of-Bounds

[,2.6.12)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[,2.6.11]
  • M
Denial of Service (DoS)

[,2.6.10)
  • M
Out-of-Bounds

[,2.2.14)
  • H
Out-of-Bounds

[,2.7.3)
  • H
Out-of-Bounds

[,2.6.11]
  • M
Resource Management Errors

[0,)
  • M
Out-of-Bounds

[,2.6.11]
  • M
Denial of Service (DoS)

[,2.8.2)
  • H
Denial of Service (DoS)

[,2.8.18)
  • H
Out-of-Bounds

[0,2.10.0)
  • M
Improper Authentication

[2.6.0,2.9.2)
  • M
Denial of Service (DoS)

[,2.6.12)
  • H
Out-of-bounds Read

[0,2.10.0)
  • M
Out-of-Bounds

[,2.2.14)
  • H
Denial of Service (DoS)

[,2.7.1)
  • H
Out-of-Bounds

[0,2.10.0)
  • H
Out-of-Bounds

[,2.8.2]
  • H
Denial of Service (DoS)

[,2.7.1)
  • M
Out-of-bounds Read

[0,2.9.8)
  • M
Out-of-Bounds

[,2.6.12)