[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14850 Download | Alert*

The host is installed with ImageMagick 7.0.8-50 Q16 and is prone to a resource management errors vulnerability. The flaws are present in MagickCore/statistic.c in EvaluateImages, which fails to handle columns. Successful exploitation could allows an attackers to execute arbitrary code.

The host is installed with ImageMagick 7.0.8-50 Q16 and is prone to an out-of-bounds read vulnerability. The flaws are present in MagickCore/threshold.c in AdaptiveThresholdImage, which fails to handle height of zero. Successful exploitation could allows an attackers to cause heap-based buffer over-read.

The host is installed with ImageMagick 7.0.8-50 Q16 and is prone to an out-of-bounds read vulnerability. The flaws are present in MagickCore/threshold.c in AdaptiveThresholdImage, which fails to handle width of zero. Successful exploitation could allows an attackers to cause heap-based buffer over-read.

The host is installed with ImageMagick before 7.0.8-50 and is prone to an Improper input validation vulnerability. The flaws are present in the function ReadCUTImage in coders/cut.c, which fails to handle use of uninitialized value. Successful exploitation could allows an attackers to cause integer overflow.

The host is installed with ImageMagick before 7.0.8-50 and is prone to resource management errors vulnerability. The flaws are present in the function ReadVIFFImage in coders/viff.c, which fails to handle unspecified vectors. Successful exploitation could allows an attackers to cause information disclosure.

The host is installed with ImageMagick before 7.0.8-50 and is prone to resource management errors vulnerability. The flaws are present in the function ReadBMPImage in coders/bmp.c, which fails to handle unspecified vectors. Successful exploitation could allows an attackers to cause information disclosure.

The host is installed with ImageMagick 7.0.8-34 and is prone to an improper initialization vulnerability. The flaws are present in the SyncImageSettings function in MagickCore/image.c, which fails to handle "use of uninitialized value". Successful exploitation could allows an attackers to cause unspecified impact.

The host is installed with ImageMagick 7.0.8-34 and is prone to an improper initialization vulnerability. The flaws are present in the SyncImageSettings function in ReadPANGOImage function in coders/pango.c, which fails to handle "use of uninitialized value". Successful exploitation could allows an attackers to cause unspecified impact.

The host is installed with ImageMagick 7.0.8-34 and is prone to a resource management errors vulnerability. The flaws are present in the ReadPCLImage function in coders/pcl.c, which fails to handle unspecified vectors. Successful exploitation could allows an attackers to cause information disclosure.

The host is installed with ImageMagick 7.0.8-34 and is prone to a resource management errors vulnerability. The flaws are present in the WriteDPXImage function in coders/dpx.c, which fails to handle unspecified vectors. Successful exploitation could allows an attackers to cause information disclosure.


Pages:      Start    14    15    16    17    18    19    20    21    22    23    24    25    26    27    ..   1484

© SecPod Technologies