Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
imagemagick imagemagick 7.0.6-2 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2017-12662
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePDFImage in coders/pdf.c.
Imagemagick Imagemagick 7.0.6-2
8.8
CVSSv3
CVE-2017-12664
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c.
Imagemagick Imagemagick 7.0.6-2
6.5
CVSSv3
CVE-2017-14139
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMSLImage in coders/msl.c.
Imagemagick Imagemagick 7.0.6-2
8.8
CVSSv3
CVE-2017-12663
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c.
Imagemagick Imagemagick 7.0.6-2
8.8
CVSSv3
CVE-2017-12665
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c.
Imagemagick Imagemagick 7.0.6-2
8.8
CVSSv3
CVE-2017-12666
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteINLINEImage in coders/inline.c.
Imagemagick Imagemagick 7.0.6-2
8.8
CVSSv3
CVE-2017-12668
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
Imagemagick Imagemagick 7.0.6-2
8.8
CVSSv3
CVE-2017-12669
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c.
Imagemagick Imagemagick 7.0.6-2
6.5
CVSSv3
CVE-2017-12563
In ImageMagick 7.0.6-2, a memory exhaustion vulnerability was found in the function ReadPSDImage in coders/psd.c, which allows malicious users to cause a denial of service.
Imagemagick Imagemagick 7.0.6-2
6.5
CVSSv3
CVE-2017-12564
In ImageMagick 7.0.6-2, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows malicious users to cause a denial of service.
Imagemagick Imagemagick 7.0.6-2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4644
unprivileged
CVE-2024-3494
CVE-2024-22460
CVE-2024-26026
CVE-2024-23473
firewall
CVE-2024-28889
XML external entity
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »