Vulnerabilities > Imagemagick > Imagemagick > 5.4

DATE CVE VULNERABILITY TITLE RISK
2012-06-05 CVE-2012-0247 Improper Input Validation vulnerability in Imagemagick
ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset and count values in the ResolutionUnit tag in the EXIF IFD0 of an image.
6.8
2010-11-22 CVE-2010-4167 Local Privilege Escalation vulnerability in ImageMagick 'configure.c' Configuration File Loading
Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.
local
imagemagick
6.9
2007-09-24 CVE-2007-4988 Incorrect Conversion between Numeric Types vulnerability in multiple products
Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow.
local
low complexity
imagemagick canonical CWE-681
7.8
2006-08-25 CVE-2006-3744 Numeric Errors vulnerability in Imagemagick
Multiple integer overflows in ImageMagick before 6.2.9 allows user-assisted attackers to execute arbitrary code via crafted Sun Rasterfile (bitmap) images that trigger heap-based buffer overflows.
network
high complexity
imagemagick CWE-189
5.1
2005-05-02 CVE-2005-0397 Unspecified vulnerability in Imagemagick
Format string vulnerability in the SetImageInfo function in image.c for ImageMagick before 6.0.2.5 may allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in a filename argument to convert, which may be called by other web applications.
network
low complexity
imagemagick
7.5