Vulnerability Database

With exploit

imagemagick / imagemagick

Title Severity Exploit Date Affected Version
CVE-2012-0247 High Jun 6, 2012 <= 6.7.5-7
CVE-2012-0248 Medium Jun 6, 2012 <= 6.7.5-7
CVE-2012-0259 Medium Jun 6, 2012 < 6.7.6-3
CVE-2012-0260 Medium Jun 6, 2012 < 6.7.6-3
CVE-2012-1185 High Jun 6, 2012 <= 6.7.5
CVE-2012-1186 Medium Jun 6, 2012 <= 6.7.5-8
CVE-2012-1610 High Jun 6, 2012 < 6.7.6-4
CVE-2012-1798 Medium Jun 6, 2012 < 6.7.6-3
CVE-2010-4167 Medium Nov 22, 2010 == 6.4.2-10
== 6.3.4-1
== 6.5.4-2
== 6.4.7-4
== 6.3.3
== 6.3.1-6
== 6.5.4-8
== 6.3.4-10
== 6.3.4-8
== 6.4.8-4
== 6.4.1-7
== 6.5.2-4
== 6.6.1-8
== 6.5.7-5
== 6.5.9-7
== 6.6.1-5
== 6.6.0-9
== 6.6.2-3
== 6.6.5-3
== 6.6.1-3
== 6.3.7-10
== 6.3.4
== 6.5.3
== 6.5.3-4
== 6.4.2
== 6.6.1-4
== 6.4.1-4
== 6.5.6-4
== 6.3.9-4
== 6.3.6-10
== 6.6.0
== 6.6.1-2
== 6.6.0-1
== 6.4.1-9
<= 6.6.5-4
== 6.4.3-5
== 6.3.4-9
== 6.5.8-6
== 6.4.5-2
== 6.3.8-7
== 6.4.7-10
== 6.5.5-3
== 6.3.7-5
== 6.5.9-4
== 6.3.8-10
== 6.4.0-1
== 6.4.2-8
== 6.6.4-10
== 6.5.8-4
== 6.5.8-7
== 6.3.9-1
== 6.6.4-2
== 6.5.0-5
== 6.3.8-2
== 6.4.8-1
== 6.6.0-4
== 6.6.2-6
== 6.3.2-1
== 6.5.4
== 6.3.3-6
== 6.4.6-2
== 6.5.2-9
== 6.5.0-2
== 6.4.7-6
== 6.3.2-5
== 6.3.9-10
== 6.6.3-5
== 6.6.1-1
== 6.4.8-6
== 6.6.3
== 6.5.3-7
== 6.3.3-5
== 6.3.5
== 6.5.5-6
== 6.5.6-8
== 6.5.8-3
== 6.6.5
== 6.4.2-1
== 6.5.2-7
== 6.5.4-3
== 6.5.1-3
== 6.6.4-9
== 6.5.8-2
== 6.5.9-1
== 6.3.9-9
== 6.5.4-1
== 6.6.3-3
== 6.5.7-9
== 6.5.7-6
== 6.4.7-9
== 6.4.8-7
== 6.4.4-7
== 6.5.7-2
== 6.6.4-8
== 6.4.9-9
== 6.3.8-1
== 6.5.1-2
== 6.5.4-5
== 6.6.4-4
== 6.4.3-3
== 6.5.8-8
== 6.4.5-7
== 6.3.7-7
== 6.4.8-9
== 6.5.5-4
== 6.5.6-7
== 6.5.5-8
== 6.5.6-2
== 6.4.7-2
== 6.6.2-7
== 6.5.1-4
== 6.5.4-7
== 6.5.3-1
== 6.3.4-6
== 6.6.2-1
== 6.5.5
== 6.6.2
== 6.4.1-8
== 6.3.3-9
== 6.6.0-6
== 6.6.3-10
== 6.3.3-2
== 6.3.5-4
== 6.4.3-7
== 6.4.6-4
== 6.3.2-4
== 6.3.8
== 6.5.2-3
== 6.3.4-3
== 6.4.6-6
== 6.3.9-2
== 6.4.1-3
== 6.5.8-9
== 6.6.5-2
== 6.4.2-7
== 6.6.1
== 6.5.7-4
== 6.5.7-7
== 6.5.0-7
== 6.3.5-9
== 6.5.2-1
== 6.3.2-6
== 6.3.9-8
== 6.5.0-8
== 6.5.1-10
== 6.5.7-3
== 6.6.2-5
== 6.5.9-3
== 6.3.8-5
== 6.5.8
== 6.3.2-3
== 6.5.4-6
== 6.3.1-7
== 6.5.6-9
== 6.4.5-4
== 6.3.6-2
== 6.5.3-3
== 6.5.5-1
== 6.5.2
== 6.6.1-10
== 6.6.3-4
== 6.6.3-7
== 6.3.7-4
== 6.5.2-6
== 6.5.5-7
== 6.5.2-5
== 6.5.1-9
== 6.4.7-7
== 6.4.8-10
== 6.5.5-9
== 6.4.3-6
== 6.3.5-6
== 6.4.0
== 6.5.6-5
== 6.3.6-5
== 6.6.3-1
== 6.5.1-7
== 6.4.0-10
== 6.6.0-10
== 6.5.4-10
== 6.5.3-10
== 6.3.2-8
== 6.6.2-8
== 6.5.2-2
== 6.4.5
== 6.3.6
== 6.4.2-9
== 6.6.2-10
== 6.4.4-1
== 6.4.9
== 6.3.7-2
== 6.3.6-1
== 6.4.4-8
== 6.4.6
== 6.5.5-2
== 6.3.3-3
== 6.3.6-7
== 6.4.1-2
== 6.5.7
== 6.5.6-6
== 6.3.3-7
== 6.3.3-4
== 6.4.5-9
== 6.4.6-5
== 6.4.5-6
== 6.4.0-11
== 6.6.0-2
== 6.6.1-7
== 6.3.7-1
== 6.4.0-8
== 6.3.6-8
== 6.4.6-3
== 6.6.4-6
== 6.5.1-1
== 6.3.6-4
== 6.4.6-9
== 6.6.2-9
== 6.6.3-2
== 6.5.8-5
== 6.4.2-6
== 6.5.9-6
== 6.5.2-10
== 6.5.0-1
== 6.4.9-5
== 6.5.0-6
== 6.4.2-4
== 6.4.4-5
== 6.3.9-7
== 6.5.9
== 6.4.3-8
== 6.3.5-5
== 6.3.9-6
== 6.3.8-9
== 6.6.1-9
== 6.3.3-1
== 6.4.3
== 6.4.9-8
== 6.6.0-7
== 6.4.8-3
== 6.5.0-3
== 6.4.8-5
== 6.6.0-8
== 6.6.4-7
== 6.6.1-6
== 6.5.5-10
== 6.4.3-2
== 6.6.5-1
== 6.4.1-5
== 6.4.4
== 6.3.9
== 6.5.6-3
== 6.4.0-5
== 6.5.3-6
== 6.4.7-5
== 6.5.1-6
== 6.4.1-1
== 6.5.5-5
== 6.5.0-10
== 6.4.5-3
== 6.3.7-9
== 6.5.3-8
== 6.4.1
== 6.3.7-3
== 6.4.9-2
== 6.5.6-10
== 6.4.7-3
== 6.3.5-10
== 6.6.4-5
== 6.5.1
== 6.4.1-6
== 6.3.6-9
== 6.3.2-2
== 6.5.9-10
== 6.3.7
== 6.4.8-2
== 6.4.0-6
== 6.4.8-8
== 6.5.0
== 6.6.2-4
== 6.5.7-8
== 6.4.9-10
== 6.3.2
== 6.3.8-6
== 6.4.3-1
== 6.5.6
== 6.6.2-2
== 6.4.7-1
== 6.6.4
== 6.4.4-3
== 6.4.6-8
== 6.5.2-8
== 6.5.9-5
== 6.3.4-2
== 6.5.9-2
== 6.4.6-1
== 6.5.8-1
== 6.6.0-5
== 6.4.5-1
== 6.5.0-9
== 6.4.2-5
== 6.3.6-3
== 6.4.3-10
== 6.4.2-2
== 6.3.8-3
== 6.3.4-4
== 6.5.3-5
== 6.3.9-5
== 6.4.0-4
== 6.5.4-9
== 6.4.8
== 6.4.9-3
== 6.4.0-7
== 6.5.0-4
== 6.6.3-6
== 6.4.9-7
== 6.3.3-8
== 6.5.9-8
== 6.3.5-7
== 6.3.4-5
== 6.5.7-1
== 6.6.4-1
== 6.3.6-6
== 6.5.1-5
== 6.4.7-8
== 6.3.2-7
== 6.5.4-4
CVE-2009-1882 High Jun 2, 2009 == 6.5.2-8