gimp

Direct Vulnerabilities

Known vulnerabilities in the https://download.gimp.org|gimp package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Off-by-one Error

[2.99.16,3.2.0)
  • H
Heap-based Buffer Overflow

[,3.2.0-rc3)
  • H
Use of Uninitialized Resource

[,3.2.0-rc2)
  • H
Out-of-bounds Write

[,3.2.0-rc3)
  • H
Heap-based Buffer Overflow

[,3.2.0-rc3)
  • H
Out-of-bounds Write

[,3.2.0-rc3)
  • M
Integer Overflow or Wraparound

[,3.2.0-rc3)
  • M
Integer Overflow or Wraparound

[,3.0.8)
  • M
Heap-based Buffer Overflow

[,3.2.0-rc3)
  • H
Heap-based Buffer Overflow

[,3.2.0-rc3)
  • M
Heap-based Buffer Overflow

[,3.2.0-rc1)
  • H
Stack-based Buffer Overflow

[,3.2.0-rc2)
  • H
Use After Free

[,3.2.0-rc1)
  • H
Integer Overflow or Wraparound

[,3.2.0-RC2)
  • H
Out-of-bounds Write

[,3.0.6)
  • H
Stack-based Buffer Overflow

[,3.0.6)
  • H
Heap-based Buffer Overflow

[,3.0.6)
  • H
Heap-based Buffer Overflow

[,3.0.6)
  • H
Integer Overflow or Wraparound

[,3.0.6)
  • H
Integer Overflow or Wraparound

[,3.0.6)
  • H
Out-of-bounds Write

[,3.0.4)
  • H
Integer Overflow or Wraparound

[,3.0.4)
  • H
Integer Overflow or Wraparound

[,3.1.2)
  • H
Out-of-bounds Write

[,3.0.0)
  • H
Stack-based Buffer Overflow

[,2.99.6)
  • H
Heap-based Buffer Overflow

[,3.0.0)
  • H
Use After Free

[,3.0.0)
  • H
Heap-based Buffer Overflow

[,2.10.36)
  • H
Integer Overflow or Wraparound

[,2.10.36)
  • H
Off-by-one Error

[,2.10.36)
  • H
Heap-based Buffer Overflow

[,2.10.36)
  • H
Denial of Service (DoS)

[1.3.20,2.10.32)
  • M
Denial of Service (DoS)

[,2.99.12)
  • M
Denial of Service (DoS)

[,2.3.19)
  • H
Out-of-bounds Read

[,2.10.0)
  • M
Out-of-Bounds

[,2.8.2)
  • M
Out-of-Bounds

[,2.7.2)
  • C
Improper Input Validation

[,2.10.4)
  • H
Out-of-Bounds

[,2.7.0)
  • H
Out-of-bounds Read

[0,2.10.0)
  • M
Out-of-Bounds

[,2.6.10)
  • M
Out-of-Bounds

[,2.6.12)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[,2.7.2)
  • M
Denial of Service (DoS)

[,2.6.10)
  • M
Out-of-Bounds

[,2.2.14)
  • H
Out-of-Bounds

[,2.7.3)
  • H
Out-of-Bounds

[,2.6.11]
  • M
Resource Management Errors

[0,)
  • M
Out-of-Bounds

[,2.6.11]
  • M
Denial of Service (DoS)

[,2.8.2)
  • H
Denial of Service (DoS)

[,2.8.18)
  • H
Out-of-Bounds

[0,2.10.0)
  • M
Improper Authentication

[2.6.0,2.9.2)
  • M
Denial of Service (DoS)

[,2.6.12)
  • H
Out-of-bounds Read

[0,2.10.0)
  • M
Out-of-Bounds

[,2.2.14)
  • H
Denial of Service (DoS)

[,2.7.1)
  • H
Out-of-Bounds

[0,2.10.0)
  • H
Out-of-Bounds

[,2.8.2]
  • H
Denial of Service (DoS)

[,2.7.1)
  • M
Out-of-bounds Read

[0,2.9.8)
  • M
Out-of-Bounds

[,2.6.12)