Show filters
648 Total Results
Displaying 31-40 of 648
Sort by:
Attacker Value
Unknown

CVE-2022-28463

Disclosure Date: May 08, 2022 (last updated October 07, 2023)
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
Attacker Value
Unknown

CVE-2022-1114

Disclosure Date: April 29, 2022 (last updated October 07, 2023)
A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.
Attacker Value
Unknown

CVE-2021-4219

Disclosure Date: March 23, 2022 (last updated October 07, 2023)
A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.
Attacker Value
Unknown

CVE-2021-3610

Disclosure Date: February 24, 2022 (last updated October 07, 2023)
A heap-based buffer overflow vulnerability was found in ImageMagick in versions prior to 7.0.11-14 in ReadTIFFImage() in coders/tiff.c. This issue is due to an incorrect setting of the pixel array size, which can lead to a crash and segmentation fault.
Attacker Value
Unknown

CVE-2021-3596

Disclosure Date: February 24, 2022 (last updated October 07, 2023)
A NULL pointer dereference flaw was found in ImageMagick in versions prior to 7.0.10-31 in ReadSVGImage() in coders/svg.c. This issue is due to not checking the return value from libxml2's xmlCreatePushParserCtxt() and uses the value directly, which leads to a crash and segmentation fault.
Attacker Value
Unknown

CVE-2021-3962

Disclosure Date: November 19, 2021 (last updated October 07, 2023)
A flaw was found in ImageMagick where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Attacker Value
Unknown

CVE-2021-39212

Disclosure Date: September 13, 2021 (last updated November 28, 2024)
ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. <policy domain="module" rights="none" pattern="PS" />. The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: <policy domain="coder" rights="none" pattern="{PS,EPI,EPS,EPSF,EPSI}" />.
Attacker Value
Unknown

CVE-2020-27769

Disclosure Date: May 14, 2021 (last updated November 28, 2024)
In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c.
Attacker Value
Unknown

CVE-2021-20312

Disclosure Date: May 11, 2021 (last updated November 28, 2024)
A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2021-20313

Disclosure Date: May 11, 2021 (last updated November 28, 2024)
A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.