Vulnerabilities > Imagemagick > Imagemagick > 5.3.0

DATE CVE VULNERABILITY TITLE RISK
2012-06-05 CVE-2012-0247 Improper Input Validation vulnerability in Imagemagick
ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset and count values in the ResolutionUnit tag in the EXIF IFD0 of an image.
6.8
2010-11-22 CVE-2010-4167 Local Privilege Escalation vulnerability in ImageMagick 'configure.c' Configuration File Loading
Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.
local
imagemagick
6.9
2007-09-24 CVE-2007-4988 Incorrect Conversion between Numeric Types vulnerability in multiple products
Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow.
local
low complexity
imagemagick canonical CWE-681
7.8
2006-08-25 CVE-2006-3744 Numeric Errors vulnerability in Imagemagick
Multiple integer overflows in ImageMagick before 6.2.9 allows user-assisted attackers to execute arbitrary code via crafted Sun Rasterfile (bitmap) images that trigger heap-based buffer overflows.
network
high complexity
imagemagick CWE-189
5.1
2005-11-16 CVE-2005-3582 Packages Insecure RUNPATH vulnerability in Gentoo Linux
ImageMagick before 6.2.4.2-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime.
local
low complexity
imagemagick
7.2