ImageMagick/ImageMagick vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://github.com|ImageMagick/ImageMagick package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Use After Free

[,7.1.1-19)
  • H
Division by zero

[,7.1.0-5)
  • H
Missing Release of Memory after Effective Lifetime

[,7.0.10-46)
  • H
Denial of Service (DoS)

[,6.9.12-91)
  • M
Heap-based Buffer Overflow

[,6.9.11-0)[7.0.0,7.0.10-0)
  • M
Heap-based Buffer Overflow

[0,)
  • M
Buffer Overflow

[,6.9.12-26)[7.0.0,7.1.0-11)
  • M
Use After Free

[,7.1.1-10)
  • M
Out-of-bounds Read

[,7.1.1-10)
  • H
Command Injection

[,7.1.1-10)
  • H
Remote Code Execution (RCE)

[0,)
  • H
Denial of Service (DoS)

[,6.9.12-88)[7.0.1-0,7.1.1-10)
  • H
Out-of-bounds Read

[7.1.1-4,7.1.1-6)
  • M
Denial of Service (DoS)

[,7.1.1-0)
  • H
Denial of Service (DoS)

[,6.9.12-76)[7.1.0-49,7.1.0-62)
  • H
Information Exposure

[,6.9.12-76)[7.1.0-33,7.1.0-52)
  • H
Buffer Overflow

[,6.9.12-62)[7.0.1-0,7.1.0-47)
  • L
Missing Release of Memory after Effective Lifetime

[,6.9.12-8)[7.0.11-5,7.0.11-8)
  • M
Integer Overflow or Wraparound

[,7.0.10-57)
  • H
Heap-based Buffer Overflow

[,7.0.11-14)
  • H
NULL Pointer Dereference

[,7.0.10-31)
  • H
Denial of Service (DoS)

[,7.1.0-30)
  • H
Heap-based Buffer Overflow

[,6.9.12-44)[7.0.10-10,7.1.0-29)
  • H
Use After Free

[,7.1.0-28)
  • M
Buffer Overflow

[,7.1.0-29)
  • H
Denial of Service (DoS)

[,6.9.12-34)[7.0.1-0,7.1.0-19)
  • H
Denial of Service (DoS)

[,6.9.9-0)[7.0.0-0,7.0.6-1)
  • M
Resource Management Errors

[0,)
  • C
Denial of Service (DoS)

[,7.0.7-2]
  • H
Memory Leak

[,6.9.10-25)[7.0.0-0,7.0.8-25)
  • H
Out-of-bounds Write

[,6.9.10-50)[7.0.0,7.0.8-50)
  • M
Out-of-bounds Read

[,6.8.9.post10)
  • M
Out-of-Bounds

[,7.0.6-1]
  • M
Information Exposure

[,6.9.9-0)[7.0.0-0,7.0.6-1)
  • M
Out-of-bounds Read

[,6.9.10-69)[7.0.0-0,7.0.9-0)
  • H
NULL Pointer Dereference

[,7.0.7-4]
  • H
Out-of-Bounds

[0,)
  • M
Denial of Service (DoS)

[,7.0.7-0]
  • L
Access Restriction Bypass

[,6.9.3.post10)
  • M
Denial of Service (DoS)

[,7.0.6-6]
  • H
Resource Management Errors

[,7.0.6-0]
  • M
Out-of-Bounds

[,7.0.6-1]
  • L
Integer Overflow or Wraparound

[,6.9.10-69)
  • M
Resource Management Errors

[,7.0.7-12]
  • M
Use After Free

[,6.9.9-6)[7.0.0-0,7.0.6-6)
  • M
Use After Free

[,7.0.6]
  • H
Out-of-bounds Write

[,6.9.11-47)[7.0.0-0,7.0.9-0)
  • M
Memory Leak

[,6.9.10-35)[7.0.0,7.0.8-35)
  • M
Resource Management Errors

[,6.9.10-6)[7.0.0,7.0.8-6)
  • M
Resource Management Errors

[,7.0.7-4]
  • M
Out-of-Bounds

[,7.0.6-2]
  • C
Use After Free

[7.0.8-61,7.0.9-7)
  • M
Improper Input Validation

[,7.0.6-5]
  • M
Out-of-Bounds

[,7.0.6-1]
  • M
Resource Management Errors

[,7.0.7-17]
  • H
Memory Leak

[,7.0.6-1]
  • M
Resource Management Errors

[,7.0.6-6]
  • M
Denial of Service (DoS)

[,7.0.6-8]
  • M
Out-of-Bounds

[,6.9.9.post1)
  • M
Resource Management Errors

[6.9.9-3,7.0.6-3]
  • M
Out-of-Bounds

[,7.0.6-3]
  • H
Arbitrary Code Execution

[5.5.6.0_2003-04-09,6.0.2]
  • M
Denial of Service (DoS)

[,6.1.8)
  • M
Out-of-Bounds

[,7.0.6-1]
  • M
Out-of-Bounds

[,7.0.5-6]
  • M
Out-of-bounds Read

[,6.9.6-0)[7.0.0-0,7.0.3-2)
  • M
Resource Management Errors

[,7.0.6-6]
  • C
Out-of-Bounds

[,7.0.6-5]
  • M
Resource Management Errors

[,6.9.9.post1)
  • M
Out-of-Bounds

[7.0.7-16,7.0.7-21)
  • M
Improper Input Validation

[,7.0.5-7]
  • M
Resource Management Errors

[,7.0.6-1]
  • M
Denial of Service (DoS)

[,6.9.4-0)[7.0.0-0,7.0.5-0)
  • L
Divide By Zero

[0,7.0.10-35)
  • H
Use After Free

[0,)
  • M
Resource Management Errors

[0,)
  • H
Double Free

[0,)
  • H
Memory Leak

[,7.0.6-2]
  • H
Out-of-Bounds

[0,)
  • M
Memory Leak

[,6.9.10-52)[7.0.0,7.0.8-52)
  • M
Resource Management Errors

[,7.0.6-1]
  • H
Improper Input Validation

[,6.7.5.post10)
  • M
Out-of-Bounds

[,7.0.5-6]
  • M
Resource Management Errors

[,6.9.1.post10)
  • H
Memory Leak

[,6.9.10-25)[7.0.0-0,7.0.8-25)
  • H
Information Exposure

[,6.9.7.post6)
  • H
Improper Input Validation

[,6.9.3.post10)
  • M
NULL Pointer Dereference

[,6.9.2.post10)
  • H
Out-of-Bounds

[,6.9.5.post8)
  • H
Divide By Zero

[,7.0.11-0:)
  • H
Denial of Service (DoS)

[,7.0.6-1]
  • M
NULL Pointer Dereference

[,6.9.10-35)[7.0.0,7.0.8-35)
  • M
Memory Leak

[0,7.0.8-58)
  • M
Use After Free

[,7.0.6-1]
  • M
Integer Overflow or Wraparound

[,6.9.10-69)[7.0.0-0,7.0.9-0)
  • H
Out-of-bounds Read

[0,7.0.8-58)
  • L
Integer Overflow or Wraparound

[,6.9.10-69)[7.0.0-0,7.0.9)
  • H
NULL Pointer Dereference

[7.0.7-0,7.0.7.7]
  • H
Out-of-bounds Write

[,6.9.10-50)[7.0.0,7.0.8-50)
  • M
Use After Free

[,7.0.7-4]
  • M
NULL Pointer Dereference

[,7.0.7-1]
  • M
NULL Pointer Dereference

[,7.0.7]
  • H
Out-of-bounds Read

[,6.9.4-10)[7.0.0-0,7.0.2-1)
  • M
Resource Management Errors

[0,7.0.8-5)
  • M
Use After Free

[,7.0.8-56)
  • H
Out-of-bounds Write

[,6.9.10-50)[7.0.0,7.0.8-50)
  • M
Resource Management Errors

[,6.3.5-9)
  • H
Memory Leak

[,7.0.6-2]
  • M
Use After Free

[,7.0.6-3]
  • H
Denial of Service (DoS)

[,6.9.9-6)[7.0.0,7.0.6-6)
  • H
Out-of-bounds Write

[0,6.9.11-7)
  • C
NULL Pointer Dereference

[,7.0.7-0]
  • M
Improper Input Validation

[,6.9.4.post5)
  • M
Out-of-bounds Write

[,6.9.9-51)[7.0.0,7.0.7-39)
  • M
Denial of Service (DoS)

[6.0,6.9.4.post1)[7.0.1-0,7.0.5.post1)
  • H
Out-of-bounds Write

[0,7.0.8-58)
  • M
Use After Free

[7.0.7-16,7.0.7-21)
  • M
Resource Management Errors

[,6.9.9.post1)
  • H
Integer Overflow or Wraparound

[,6.9.10-69)[7.0.0-0,7.0.8-69)
  • M
Divide By Zero

[,6.9.10-41)[7.0.0,7.0.8-41)
  • H
Resource Management Errors

[0,)
  • M
Out-of-bounds Read

[,6.9.10-41)[7.0.0,7.0.8-41)
  • M
Out-of-bounds Read

[,6.9.4.post1)
  • M
NULL Pointer Dereference

[6.9.9-4,7.0.6-4]
  • M
NULL Pointer Dereference

[,6.9.9.post1)
  • M
Resource Management Errors

[,6.9.10-11)[7.0.0,7.0.8-11)
  • M
Resource Management Errors

[,6.9.8-1)[7.0.0,7.0.5-6)
  • M
Information Exposure

[,6.9.3.post10)
  • M
Out-of-Bounds

[,7.0.6-1]
  • M
Out-of-Bounds

[,7.0.6-2]
  • M
Denial of Service (DoS)

[,7.0.7-0]
  • H
Out-of-Bounds

[,6.9.6-6)[7.0.0-0,7.0.3.post9)
  • H
Memory Leak

[,7.0.6-2]
  • M
Denial of Service (DoS)

[,7.0.7-3]
  • L
Integer Overflow or Wraparound

[,6.9.10-69)[7.0.0-0,7.0.9-0)
  • H
Denial of Service (DoS)

[,7.0.4-9]
  • H
Improper Initialization

[,6.9.10-35)[7.0.0,7.0.8-35)
  • M
Out-of-bounds Read

[,6.7.6-3)
  • L
Integer Overflow or Wraparound

[,6.9.10-69)[7.0.0-0,7.0.9.0)
  • M
Denial of Service (DoS)

[,6.9.9.post0)
  • M
Integer Overflow or Wraparound

[,6.9.10-68)[7.0.0-0,7.0.8-68)
  • C
NULL Pointer Dereference

[7.0.7-0,7.0.7.7]
  • M
Denial of Service (DoS)

[,6.9.6.post4)
  • H
Improper Access Control

[0,)
  • H
Out-of-bounds Write

[0,)
  • M
Resource Management Errors

[,7.0.6-2]
  • M
Out-of-Bounds

[,7.0.5-6]
  • L
Integer Overflow or Wraparound

[,6.9.10-69)[7.0.0-0,7.0.9)
  • M
Denial of Service (DoS)

[,6.9.4.post10)
  • M
Out-of-Bounds

[,7.0.6-4]
  • M
Improper Input Validation

[,7.0.5-7]
  • M
Out-of-bounds Read

[,6.9.5-8)[7.0.0-0,7.0.2-10)
  • H
Improper Access Control

[0,)
  • M
Unchecked Return Value

[,6.9.10-6)[7.0.0,7.0.8-6)
  • M
Memory Leak

[7.0.0-0,7.0.8-50)
  • H
Out-of-bounds Read

[,7.0.6-1]
  • H
Out-of-Bounds

[,6.9.5.post1)
  • L
Denial of Service (DoS)

[,6.2.9)
  • M
Resource Management Errors

[,7.0.7-12]
  • C
Improper Access Control

[0,)
  • M
Denial of Service (DoS)

[,7.0.7-2]
  • M
Out-of-Bounds

[,6.9.10-11)[7.0.0,7.0.8-11)
  • C
Out-of-Bounds

[0,)
  • M
Denial of Service (DoS)

[,6.7.5.post10)
  • M
Out-of-Bounds

[,7.0.6-6]
  • M
Improper Input Validation

[,6.9.7.post10)
  • M
Memory Leak

[,6.9.9-35)[7.0.0-0,7.0.7-23)
  • L
Integer Overflow or Wraparound

[,6.9.10-68)[7.0.0-0,7.0.8-68)
  • M
Resource Management Errors

[,6.9.10-5)[7.0.0,7.0.8-5)
  • H
Out-of-Bounds

[,6.9.4.post1)
  • H
Arbitrary Code Execution

[5.5.6.0_2003-04-09,6.0.1]
  • M
Out-of-bounds Read

[,6.9.4.post1)
  • M
Denial of Service (DoS)

[,6.9.9.post3)
  • M
Improper Input Validation

[,7.0.6-1]
  • M
Out-of-Bounds

[,7.0.6-3]
  • H
Out-of-bounds Read

[0,7.0.8-58)
  • M
Denial of Service (DoS)

[0,)
  • M
Use After Free

[6.0,6.9.10-42)[7.0.0-0,7.0.8-42)
  • M
Improper Input Validation

[,7.0.6-8]
  • M
Resource Management Errors

[,7.0.7-1]
  • H
Out-of-Bounds

[,6.9.4.post4)
  • L
Integer Overflow or Wraparound

[,6.9.10-68)[7.0.0-0,7.0.8-68)
  • M
Denial of Service (DoS)

[6.0,6.9.0-5)
  • M
Out-of-Bounds

[,7.0.6-4]
  • H
Memory Leak

[,7.0.6-1]
  • M
CVE-2017-11352

[,6.9.8-9)[7.0.0-0,7.0.5-10)
  • H
Out-of-Bounds

[,6.9.5.post1)
  • M
Resource Management Errors

[,7.0.7-12]
  • L
Integer Overflow or Wraparound

[,7.0.9-0)
  • M
Memory Leak

[,6.9.10-69)[7.0.0-0,7.0.9-0)
  • H
Improper Initialization

[,6.9.10-35)[7.0.0,7.0.8-35)
  • M
Out-of-Bounds

[,6.7.8.post10)
  • H
Out-of-bounds Write

[6.9.10-54,6.9.10-55)[7.0.0-0,7.0.8-54)
  • H
Denial of Service (DoS)

[,6.9.9-6)[7.0.0,7.0.6-6)
  • M
Integer Overflow or Wraparound

[,6.9.10-68)[7.0.0-0,7.0.8-68)
  • H
Memory Leak

[,7.0.6-2]
  • H
Out-of-bounds Read

[,6.9.5.post6)
  • M
Out-of-Bounds

[,7.0.6-6]
  • H
Denial of Service (DoS)

[,6.3.5-9)
  • M
Out-of-bounds Read

[,7.0.6-4]
  • M
Improper Data Handling

[,6.9.4.post10)
  • M
Denial of Service (DoS)

[,6.9.9.post0)
  • M
Resource Management Errors

[,6.9.9-40)[7.0.0,7.0.7-29)
  • M
Denial of Service (DoS)

[,6.6.0.post10)
  • H
Integer Overflow or Wraparound

[,6.7.5.post10)
  • C
Improper Input Validation

[,6.9.4.post5)
  • M
Out-of-bounds Read

[,6.9.9-11)[7.0.0-0,7.0.7)
  • M
Out-of-Bounds

[0,)
  • M
Buffer Overflow

[,6.9.4.post5)
  • C
NULL Pointer Dereference

[,7.0.7-0]
  • M
Memory Leak

[,6.9.10-50)[7.0.0,7.0.8-50)
  • H
Out-of-Bounds

[,6.9.4.post5)
  • C
Arbitrary Code Execution

[,6.1.0)
  • H
Out-of-Bounds

[,7.0.6-1]
  • C
Use After Free

[,6.9.9-24)[7.0.0-0,7.0.7-12)
  • M
Divide By Zero

[,6.9.11-62)[7.0.0,7.0.10-62)
  • M
Memory Leak

[,6.9.10-36)[7.0.0,7.0.8-36)
  • H
Integer Overflow or Wraparound

[,6.7.6-4)
  • M
Improper Input Validation

[,6.9.8.post8)
  • M
Denial of Service (DoS)

[,7.0.7-2]
  • M
Out-of-Bounds

[,7.0.6-10]
  • H
Out-of-Bounds

[,7.0.6-1]
  • M
Denial of Service (DoS)

[,6.3.3-5)
  • C
Out-of-Bounds

[,6.9.3.post10)
  • H
CVE-2005-3582

[,6.2.4.2)
  • M
Out-of-Bounds

[,7.0.6-1]
  • M
Out-of-Bounds

[,7.0.6-3]
  • M
Resource Management Errors

[,6.9.9-40)[7.0.0,7.0.7-29)
  • M
Out-of-Bounds

[,6.9.5.post6)
  • H
Out-of-Bounds

[,7.0.7-16]
  • M
Out-of-bounds Read

[,6.9.2.post10)
  • H
Integer Overflow or Wraparound

[6.9.1-3,7.0.5-0]
  • H
Out-of-Bounds

[,7.0.6-8]
  • H
Memory Leak

[,7.0.6-1]
  • M
Out-of-bounds Read

[,6.8.9.post10)
  • M
Memory Leak

[,6.9.10-36)[7.0.0,7.0.8-36)
  • M
Out-of-Bounds

[,6.9.7.post4)
  • M
Out-of-Bounds

[,7.0.6-3]
  • M
Memory Leak

[7.0.0-0,7.0.8-50)
  • C
NULL Pointer Dereference

[,6.9.4.post5)
  • M
Divide By Zero

[,7.0.6-8]
  • L
Integer Overflow or Wraparound

[,6.9.10-69)[7.0.0-0,7.0.9-0)
  • M
Denial of Service (DoS)

[,7.0.6-1]
  • M
Denial of Service (DoS)

[,7.0.6-6]
  • M
Resource Management Errors

[0,7.0.7-16)
  • C
NULL Pointer Dereference

[,7.0.7-0]
  • M
Divide By Zero

[6.9.9-34,6.9.10-69)[7.0.0-0,7.0.9-0)
  • M
Out-of-Bounds

[,7.0.6-2]
  • M
Memory Leak

[,6.9.10-50)[7.0.0-0,7.0.8-50)
  • M
NULL Pointer Dereference

[,7.0.7-0]
  • M
Out-of-bounds Write

[7.0.0-0,7.0.6-6)
  • C
Out-of-bounds Read

[,6.9.4.post3)
  • L
Integer Overflow or Wraparound

[,6.9.10-69)[7.0.8,7.0.8-69)
  • M
Memory Leak

[,6.9.10-36)[7.0.0,7.0.8-36)
  • H
Denial of Service (DoS)

[,6.9.5-10)[7.0.0-0,7.0.3-1)
  • H
Buffer Overflow

[6.0,6.0.6.2)[6.2,6.2.4.5)
  • H
Out-of-Bounds

[,6.9.4-0)[7.0.0-0,7.0.3-3)
  • M
Information Exposure

[,7.0.6-1]
  • M
Resource Management Errors

[,6.9.10-5)[7.0.0,7.0.8-5)
  • H
NULL Pointer Dereference

[,7.0.7-0]
  • M
Arbitrary Code Execution

[5.5.6.0_2003-04-09,6.0.2]
  • H
Out-of-bounds Read

[,6.9.10-50)[7.0.0,7.0.8-50)
  • H
Resource Management Errors

[,6.9.9.post4)
  • M
NULL Pointer Dereference

[,6.9.9-15)[7.0.0-0,7.0.7.post2)
  • H
Out-of-bounds Write

[,6.9.10-50)[7.0.0,7.0.8-50)
  • H
Improper Access Control

[,6.9.8.post0)
  • M
Resource Management Errors

[,7.0.7-12]
  • M
Denial of Service (DoS)

[,7.0.7-0]
  • M
Out-of-Bounds

[,7.0.7-1]
  • H
NULL Pointer Dereference

[,7.0.7-0]
  • H
Out-of-Bounds

[,6.9.3.post10)
  • M
Information Exposure

[,6.9.10-9)[7.0.0-0,7.0.8-9)
  • M
Denial of Service (DoS)

[,7.0.6-2]
  • C
NULL Pointer Dereference

[7.0.7-0,7.0.7.7]
  • H
Off-by-one Error

[,6.9.9-40)[7.0.0-0,7.0.7-28)
  • M
Resource Management Errors

[,6.9.9.post1)
  • M
Denial of Service (DoS)

[,7.0.6-1]
  • H
Out-of-bounds Read

[,7.0.7-4]
  • H
Out-of-bounds Read

[0,)
  • H
Out-of-Bounds

[,7.0.6-0]
  • M
Out-of-Bounds

[,7.0.7-1]
  • H
Resource Management Errors

[,6.9.2.post10)
  • H
Out-of-Bounds

[,7.0.6]
  • M
Heap-based Buffer Overflow

[,7.0.10-45)
  • M
Memory Leak

[,6.9.10-43)[7.0.0,7.0.8-43)
  • H
Denial of Service (DoS)

[,7.0.6-1]
  • H
Resource Management Errors

[,7.0.7-2]
  • M
Arbitrary Code Execution

[,6.2.9)
  • M
Resource Management Errors

[0,)
  • M
NULL Pointer Dereference

[,6.9.9-42)[7.0.0-0,7.0.7.post30)
  • M
Buffer Overflow

[7.0.0-0,7.0.9-0)
  • M
NULL Pointer Dereference

[,7.0.6-10]
  • H
Out-of-bounds Read

[,6.9.10-50)[7.0.0,7.0.8-50)
  • M
Resource Management Errors

[,7.0.7-12]
  • H
Out-of-bounds Read

[0,7.0.8-58)
  • M
Improper Input Validation

[,7.0.5-8]
  • H
Memory Leak

[,7.0.6-2]
  • H
Out-of-bounds Read

[,6.9.10-43)[7.0.0,7.0.8-43)
  • M
Denial of Service (DoS)

[,7.0.6-6]
  • M
Denial of Service (DoS)

[,7.0.7-16]
  • M
Denial of Service (DoS)

[,6.9.9.post0)
  • M
Out-of-bounds Read

[,6.9.10-68)[7.0.0-0,7.0.8-68)
  • M
Resource Management Errors

[,6.9.9.post1)
  • M
Denial of Service (DoS)

[,6.3.5-9)
  • C
Out-of-bounds Read

[,6.9.9.post1)
  • H
Buffer Overflow

[,6.8.8-5)
  • L
Memory Leak

[,6.9.10-69)[7.0.0-0,7.0.9-0)
  • H
Memory Leak

[,6.9.8.post5)
  • M
Denial of Service (DoS)

[,6.9.10-16)[7.0.0-0,7.0.8-16)
  • H
Out-of-bounds Write

[0,)
  • M
Out-of-Bounds

[,7.0.6-3]
  • H
Divide By Zero

[,6.9.12)[7.0.0-0,7.0.11-0)
  • H
Arbitrary Code Execution

[6.0.6.2,6.2.4]
  • M
Out-of-bounds Read

[,6.9.10-68)[7.0.0-0,7.0.8-68)
  • M
Divide By Zero

[,6.9.11-62)[7.0.10,7.0.10-62)
  • H
Out-of-Bounds

[,6.9.5.post8)
  • H
Integer Overflow or Wraparound

[,7.0.11-0)
  • M
Improper Input Validation

[,7.0.5-7]
  • M
Memory Leak

[,6.9.10-50)[7.0.0,7.0.8-50)
  • M
Improper Check for Unusual or Exceptional Conditions

[,6.9.9.post1)
  • H
Improper Input Validation

[,7.0.6-1]
  • H
Out-of-Bounds

[,7.0.6-8]
  • H
Use After Free

[,7.0.8-62)
  • H
Improper Access Control

[0,)
  • M
Out-of-bounds Read

[,6.9.5.post3)
  • H
Divide By Zero

[,7.0.11-0)
  • H
Use of Uninitialized Resource

[,6.9.10-50)[7.0.0-0,7.0.8-50)
  • M
Out-of-Bounds

[,7.0.6-6]
  • C
Out-of-bounds Read

[6.9.9-33,6.9.10-43)[7.0.7-23,7.0.8-43)
  • H
Double Free

[0,)
  • M
Divide By Zero

[,7.0.10-62)
  • M
Memory Leak

[,6.9.10-36)[7.0.0,7.0.8-36)
  • M
Denial of Service (DoS)

[,7.0.7-16]
  • H
Out-of-bounds Write

[0,)
  • H
Out-of-Bounds

[,6.9.5.post8)
  • M
Out-of-bounds Write

[,6.9.10-68)[7.0.8,7.0.8-68)
  • M
Resource Management Errors

[0,7.0.7-16)
  • M
NULL Pointer Dereference

[,6.9.6-5)[7.0.0-0,7.0.3-7)
  • M
Resource Management Errors

[0,7.0.8-7)
  • M
Memory Leak

[,6.9.10-40)[7.0.0,7.0.8-40)
  • H
Out-of-bounds Write

[,6.9.10-50)[7.0.0,7.0.8-50)
  • H
Memory Leak

[,6.9.10-25)[7.0.0-0,7.0.8-25)
  • C
Out-of-bounds Write

[,6.9.10-43)[7.0.0,7.0.8-43)
  • H
Out-of-bounds Read

[0,)
  • M
NULL Pointer Dereference

[0,7.0.7-1)
  • C
NULL Pointer Dereference

[,7.0.8-8)
  • M
Out-of-Bounds

[,7.0.6-8]
  • C
NULL Pointer Dereference

[,7.0.8-8)
  • H
Out-of-Bounds

[,7.0.7-9]
  • C
NULL Pointer Dereference

[,7.0.7-0]
  • M
Out-of-Bounds

[,7.0.6-1]
  • M
Memory Leak

[,6.9.10-50)[7.0.0,7.0.8-50)
  • M
Memory Leak

[,6.9.10-43)[7.0.0,7.0.8-43)
  • H
Out-of-Bounds

[,6.9.5.post8)
  • M
Out-of-Bounds

[,7.0.6-1]
  • M
Denial of Service (DoS)

[,7.0.7-16]
  • H
Information Exposure

[,7.0.11-0)
  • M
Improper Input Validation

[,7.0.6-1]
  • M
Out-of-Bounds

[,7.0.5-6]
  • H
Out-of-Bounds

[,6.9.4.post4)
  • H
Out-of-Bounds

[,7.0.7-16]
  • H
CVE-2010-4167

[,6.6.5.post10)
  • M
Out-of-Bounds

[,6.9.9.post0)
  • M
Out-of-bounds Read

[,6.9.1.post10)
  • M
Out-of-Bounds

[,7.0.6-1]
  • M
Denial of Service (DoS)

[5.5.6.0_2003-04-09,5.5.7]
  • M
Denial of Service (DoS)

[,7.0.6-6]
  • H
Memory Leak

[,6.9.7.post4)
  • M
Resource Management Errors

[,6.9.9-40)[7.0.0,7.0.7-29)
  • M
Out-of-Bounds

[,7.0.4-9]
  • M
Out-of-Bounds

[,7.0.6-1]
  • L
Integer Overflow or Wraparound

[,6.9.10-68)[7.0.0-0,7.0.8-68)
  • M
Out-of-bounds Read

[,6.9.10-32)[7.0.0-0,7.0.8-32)
  • H
Out-of-Bounds

[,7.0.6-5]
  • M
Denial of Service (DoS)

[,6.3.0.7)
  • M
Resource Management Errors

[,7.0.7]
  • M
Denial of Service (DoS)

[0,)
  • M
Resource Management Errors

[,7.0.7-1]
  • M
Resource Management Errors

[,7.0.7-1]
  • H
Improper Initialization

[0,)
  • H
Out-of-Bounds

[,6.9.5.post6)
  • H
Resource Management Errors

[,7.0.5-6]
  • M
Out-of-Bounds

[,6.9.6.post4)
  • M
Denial of Service (DoS)

[0,)
  • L
Integer Overflow or Wraparound

[,6.9.10-69)[7.0.0-0,7.0.9-0)
  • M
Divide By Zero

[,6.9.10-68)[7.0.0-0,7.0.8-68)
  • M
Divide By Zero

[,6.9.5.post8)
  • M
Resource Management Errors

[,7.0.6-8]
  • M
Resource Management Errors

[0,7.0.7-16)
  • H
Out-of-bounds Read

[0,)
  • M
Denial of Service (DoS)

[,7.0.6-1]
  • H
Out-of-bounds Read

[7.0.9-27,7.0.10.post18)
  • M
Out-of-Bounds

[,7.0.6-0]
  • H
Denial of Service (DoS)

[,7.0.6-5]
  • M
Out-of-Bounds

[,6.9.9.post4)
  • M
Double Free

[7.0.1-0,7.0.5-0]
  • M
Out-of-Bounds

[,7.0.6-1]
  • M
Improper Input Validation

[,7.0.6-3]
  • H
Use After Free

[,1.3.31)[6.9.0,6.9.10-43)[7.0.0,7.0.8-43)
  • M
Memory Leak

[,7.0.6.post1)
  • M
Divide By Zero

[,6.9.10-54)[7.0.0,7.0.8-54)
  • M
Out-of-Bounds

[,7.0.6-6]
  • H
Out-of-bounds Write

[,6.5.4.post10)
  • M
Out-of-Bounds

[,7.0.6-4]
  • M
Denial of Service (DoS)

[,6.7.5.post10)
  • M
Denial of Service (DoS)

[,6.7.6-3)
  • L
Integer Overflow or Wraparound

[,7.0.9-0)
  • M
Divide By Zero

[6.0,6.9.10-41)[7.0.0-0,7.0.8-41)
  • H
Use After Free

[,6.9.10-55)[7.0.0-0,7.0.8-55)
  • M
Improper Input Validation

[0,)
  • M
Out-of-Bounds

[,6.9.9.post5)
  • M
Integer Overflow or Wraparound

[,7.0.6-10]
  • M
Improper Input Validation

[,6.9.3.post10)
  • H
Out-of-bounds Write

[0,)
  • H
Improper Access Control

[0,)
  • H
Out-of-Bounds

[,6.9.3.post10)
  • H
Memory Leak

[,7.0.6-2]
  • C
Out-of-bounds Read

[7.0.0-0,7.0.2-7)
  • M
Out-of-bounds Read

[,6.9.9-24)[7.0.0-0,7.0.7-12)
  • H
Out-of-Bounds

[,7.0.6-1]
  • M
Out-of-Bounds

[,7.0.6-4]
  • H
NULL Pointer Dereference

[,7.0.7-0]
  • L
Integer Overflow or Wraparound

[,6.9.10-69)[7.0.0-0,7.0.9)
  • C
NULL Pointer Dereference

[,6.9.4.post5)
  • M
Divide By Zero

[,6.9.11-62)[7.0.0,7.0.10-62)
  • M
Denial of Service (DoS)

[,6.9.9.post0)
  • C
Improper Access Control

[,6.9.3.post10)
  • M
Out-of-bounds Read

[,6.7.6-3)
  • L
Integer Overflow or Wraparound

[,6.9.10-69)[7.0.0-0,7.0.9-0)
  • M
Memory Leak

[,6.9.9-42)[7.0.0-0,7.0.7.post30)
  • H
Out-of-bounds Read

[,6.9.10-40)[7.0.0,7.0.8-40)
  • M
Improper Input Validation

[,6.9.6.post4)
  • M
Improper Input Validation

[,7.0.5-7]
  • M
Denial of Service (DoS)

[6.0,6.9.0-5)
  • M
Out-of-bounds Read

[,6.8.9.post10)
  • C
Denial of Service (DoS)

[0,)
  • M
Resource Management Errors

[0,)
  • L
Divide By Zero

[,6.9.10-69)[7.0.0-0,7.0.9)
  • M
Denial of Service (DoS)

[,7.0.7]
  • C
Integer Overflow or Wraparound

[,7.0.2.post2)
  • M
Information Exposure

[6.9.12-0,6.9.12-22)[7.1.0-0,7.1.0-7)
  • M
Out-of-Bounds

[,7.0.6-1]
  • M
Out-of-bounds Read

[,6.8.9.post10)
  • H
Denial of Service (DoS)

[,5.4.4)[6.0.6.0,6.0.6.2)
  • M
Denial of Service (DoS)

[,7.0.6-6]
  • M
Resource Management Errors

[,6.9.10-5)[7.0.0,7.0.8-5)
  • M
Out-of-Bounds

[,6.9.1.post10)
  • M
Out-of-bounds Read

[,6.9.11-0)[7.0.0,7.0.10-0)
  • H
Integer Overflow or Wraparound

[,7.0.8-50)
  • M
Unchecked Return Value

[,6.9.4-8)[7.0.0-0,7.0.1-10)
  • M
Denial of Service (DoS)

[5.5.6.0_2003-04-09,5.5.7]
  • M
Divide By Zero

[,6.9.11-57)[7.0.0-0,7.0.10-56)
  • M
Denial of Service (DoS)

[0,)
  • H
XML External Entity (XXE) Injection

[6.9.8-1,6.9.11-40)[7.0.5-3,7.0.10-40)
  • M
Denial of Service (DoS)

[,6.9.10-28)[7.0.0,7.0.8-28)
  • M
Out-of-Bounds

[,6.3.5-9)
  • H
Memory Leak

[,6.9.10-25)[7.0.0-0,7.0.8-25)
  • H
Integer Overflow or Wraparound

[,6.9.10-50)[7.0.0-0,7.0.2-10)
  • M
Resource Management Errors

[,7.0.7]
  • M
Resource Management Errors

[,7.0.7-17]
  • M
Denial of Service (DoS)

[,7.0.6-6]
  • L
Integer Overflow or Wraparound

[,6.9.10-69)[7.0.0-0,7.0.9-0)
  • H
Denial of Service (DoS)

[,7.0.6-1]
  • M
Denial of Service (DoS)

[6.0,6.9.0-5)
  • M
Divide By Zero

[,6.9.10-68)[7.0.0-0,7.0.8-68)
  • H
Denial of Service (DoS)

[,6.9.9-0)[7.0.0-0,7.0.6-1)
  • H
Out-of-bounds Write

[0,7.0.8-58)
  • L
Divide By Zero

[,6.9.10-69)[7.0.0-0,7.0.9)
  • M
Denial of Service (DoS)

[,7.0.6-2]
  • M
Out-of-bounds Read

[,6.9.10-43)[7.0.0,7.0.8-43)
  • M
Unchecked Return Value

[,6.9.4-1)[7.0.0-0,7.0.1-10)
  • M
Out-of-Bounds

[,7.0.6-5]
  • M
Resource Management Errors

[0,)
  • M
Denial of Service (DoS)

[,7.0.6-1]
  • H
Out-of-Bounds

[,7.0.7-6]
  • M
Divide By Zero

[,7.0.10-62)
  • M
Resource Management Errors

[0,)
  • L
Divide By Zero

[,6.9.10-68)[7.0.0-0,7.0.8-68)
  • M
NULL Pointer Dereference

[,6.9.9-11)[7.0.0-0,7.0.7)
  • H
Memory Leak

[,7.0.6-2]
  • L
Integer Overflow or Wraparound

[,6.9.10-69)[7.0.0-0,7.0.9)
  • M
Improper Input Validation

[,6.9.9.post0)
  • M
Improper Access Control

[,6.9.3.post10)
  • H
Arbitrary Code Execution

[5.3.3,6.2.0.7]
  • M
Denial of Service (DoS)

[6.0,6.2.1]
  • M
Denial of Service (DoS)

[,6.2.2.0)
  • H
Memory Leak

[,6.9.10-25)[7.0.0-0,7.0.8-25)
  • M
Information Exposure

[,7.0.6-1]
  • H
Use of Uninitialized Resource

[,6.9.8-1)[7.0.0-0,7.0.5-2)
  • H
Denial of Service (DoS)

[0,1.0.3-7)