Vulnerabilities > Imagemagick > Imagemagick > 5.5.7.31
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2012-06-05 | CVE-2012-0247 | Improper Input Validation vulnerability in Imagemagick ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset and count values in the ResolutionUnit tag in the EXIF IFD0 of an image. | 6.8 |
2010-11-22 | CVE-2010-4167 | Local Privilege Escalation vulnerability in ImageMagick 'configure.c' Configuration File Loading Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory. local imagemagick | 6.9 |
2007-09-24 | CVE-2007-4988 | Incorrect Conversion between Numeric Types vulnerability in multiple products Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow. | 7.8 |
2006-08-25 | CVE-2006-3744 | Numeric Errors vulnerability in Imagemagick Multiple integer overflows in ImageMagick before 6.2.9 allows user-assisted attackers to execute arbitrary code via crafted Sun Rasterfile (bitmap) images that trigger heap-based buffer overflows. | 5.1 |
2005-11-16 | CVE-2005-3582 | Packages Insecure RUNPATH vulnerability in Gentoo Linux ImageMagick before 6.2.4.2-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime. | 7.2 |