Show filters
648 Total Results
Displaying 11-20 of 648
Sort by:
Attacker Value
Unknown

CVE-2023-3745

Disclosure Date: July 24, 2023 (last updated April 25, 2024)
A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service.
Attacker Value
Unknown

CVE-2023-3195

Disclosure Date: June 16, 2023 (last updated October 08, 2023)
A stack-based buffer overflow issue was found in ImageMagick's coders/tiff.c. This flaw allows an attacker to trick the user into opening a specially crafted malicious tiff file, causing an application to crash, resulting in a denial of service.
Attacker Value
Unknown

CVE-2023-34475

Disclosure Date: June 16, 2023 (last updated July 12, 2024)
A heap use after free issue was discovered in ImageMagick's ReplaceXmpValue() function in MagickCore/profile.c. An attacker could trick user to open a specially crafted file to convert, triggering an heap-use-after-free write error, allowing an application to crash, resulting in a denial of service.
Attacker Value
Unknown

CVE-2023-34474

Disclosure Date: June 16, 2023 (last updated July 12, 2024)
A heap-based buffer overflow issue was discovered in ImageMagick's ReadTIM2ImageData() function in coders/tim2.c. A local attacker could trick the user in opening specially crafted file, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
Attacker Value
Unknown

CVE-2023-2157

Disclosure Date: June 06, 2023 (last updated October 08, 2023)
A heap-based buffer overflow vulnerability was found in the ImageMagick package that can lead to the application crashing.
Attacker Value
Unknown

CVE-2023-34153

Disclosure Date: May 30, 2023 (last updated October 08, 2023)
A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding.
Attacker Value
Unknown

CVE-2023-34151

Disclosure Date: May 30, 2023 (last updated December 21, 2024)
A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546).
Attacker Value
Unknown

CVE-2023-1906

Disclosure Date: April 12, 2023 (last updated October 08, 2023)
A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
Attacker Value
Unknown

CVE-2023-1289

Disclosure Date: March 23, 2023 (last updated October 08, 2023)
A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.
Attacker Value
Unknown

CVE-2022-3568

Disclosure Date: February 10, 2023 (last updated October 08, 2023)
The ImageMagick Engine plugin for WordPress is vulnerable to deserialization of untrusted input via the 'cli_path' parameter in versions up to, and including 1.7.5. This makes it possible for unauthenticated users to call files using a PHAR wrapper, granted they can trick a site administrator into performing an action such as clicking on a link, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.