Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*
There are 183 matching records.
Displaying matches 181 through 183.
Vuln ID Summary CVSS Severity

Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.

Published: November 22, 2010; 3:00:03 PM -0500
V3.x:(not available)
V2.0: 6.9 MEDIUM

Multiple integer overflows in ImageMagick before 6.2.9 allows user-assisted attackers to execute arbitrary code via crafted Sun Rasterfile (bitmap) images that trigger heap-based buffer overflows.

Published: August 24, 2006; 9:04:00 PM -0400
V3.x:(not available)
V2.0: 5.1 MEDIUM

ImageMagick before allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime.

Published: November 16, 2005; 2:42:00 AM -0500
V3.x:(not available)
V2.0: 7.2 HIGH