Количество 7
Количество 7

CVE-2010-4167
Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.

CVE-2010-4167
Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.

CVE-2010-4167
Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.
CVE-2010-4167
Untrusted search path vulnerability in configure.c in ImageMagick befo ...
GHSA-47hr-2rq3-9pw5
Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.
ELSA-2012-0301
ELSA-2012-0301: ImageMagick security and bug fix update (LOW)
ELSA-2012-0544
ELSA-2012-0544: ImageMagick security update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2010-4167 Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory. | CVSS2: 6.9 | 0% Низкий | больше 14 лет назад |
![]() | CVE-2010-4167 Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory. | CVSS2: 2.6 | 0% Низкий | почти 15 лет назад |
![]() | CVE-2010-4167 Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory. | CVSS2: 6.9 | 0% Низкий | больше 14 лет назад |
CVE-2010-4167 Untrusted search path vulnerability in configure.c in ImageMagick befo ... | CVSS2: 6.9 | 0% Низкий | больше 14 лет назад | |
GHSA-47hr-2rq3-9pw5 Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory. | 0% Низкий | больше 3 лет назад | ||
ELSA-2012-0301 ELSA-2012-0301: ImageMagick security and bug fix update (LOW) | больше 13 лет назад | |||
ELSA-2012-0544 ELSA-2012-0544: ImageMagick security update (MODERATE) | больше 13 лет назад |
Уязвимостей на страницу