Search for vulnerabilities
Vulnerability details: VCID-57ax-v1dj-aaas
Vulnerability ID VCID-57ax-v1dj-aaas
Aliases CVE-2007-4985
Summary ImageMagick before 6.3.5-9 allows context-dependent attackers to cause a denial of service via a crafted image file that triggers (1) an infinite loop in the ReadDCMImage function, related to ReadBlobByte function calls; or (2) an infinite loop in the ReadXCFImage function, related to ReadBlobMSBLong function calls.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2008:0145
rhas Moderate https://access.redhat.com/errata/RHSA-2008:0165
epss 0.02137 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02137 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02137 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02137 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.02334 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.03418 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.05048 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.05048 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.05048 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.05048 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.05048 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.05048 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.05048 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.05048 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.05048 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.05048 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.05048 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
epss 0.05048 https://api.first.org/data/v1/epss?cve=CVE-2007-4985
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=310091
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2007-4985
generic_textual Medium http://www.imagemagick.org/script/changelog.php
Reference id Reference type URL
http://bugs.gentoo.org/show_bug.cgi?id=186030
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=596
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4985.json
https://api.first.org/data/v1/epss?cve=CVE-2007-4985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985
http://secunia.com/advisories/26926
http://secunia.com/advisories/27048
http://secunia.com/advisories/27309
http://secunia.com/advisories/27364
http://secunia.com/advisories/27439
http://secunia.com/advisories/28721
http://secunia.com/advisories/29786
http://secunia.com/advisories/29857
http://secunia.com/advisories/36260
http://security.gentoo.org/glsa/glsa-200710-27.xml
https://exchange.xforce.ibmcloud.com/vulnerabilities/36740
https://issues.rpath.com/browse/RPL-1743
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10869
http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html
http://www.debian.org/security/2009/dsa-1858
http://www.imagemagick.org/script/changelog.php
http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:035
http://www.novell.com/linux/security/advisories/2007_23_sr.html
http://www.redhat.com/support/errata/RHSA-2008-0145.html
http://www.redhat.com/support/errata/RHSA-2008-0165.html
http://www.securityfocus.com/archive/1/483572/100/0/threaded
http://www.securityfocus.com/bid/25764
http://www.securitytracker.com/id?1018729
http://www.ubuntu.com/usn/usn-523-1
http://www.vupen.com/english/advisories/2007/3245
310091 https://bugzilla.redhat.com/show_bug.cgi?id=310091
444266 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444266
cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:5.3.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.3.8:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:5.4.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:5.4.8.2_1.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.4.8.2_1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:5.5.3_.2_1.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.3_.2_1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:5.5.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:5.5.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_20030409:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_20030409:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:5.5.7.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:5.5.7.15:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.0.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.2.5:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.0.4.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.4.4:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.0.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.0.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.0.8:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.1:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.1.2:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.1.3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.1.4:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.1.5:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.1.6:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.1.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.1.7:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.1.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.1.8:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.0.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.2:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.4:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.4.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.4.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.5:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.6:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.7:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.8:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.9:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.2.9.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.2.9.2:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.1:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.2:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.3_3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3_3:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.3_5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3_5:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.3_6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.3_6:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:imagemagick:imagemagick:6.3.4:*:*:*:*:*:*:*
CVE-2007-4985 https://nvd.nist.gov/vuln/detail/CVE-2007-4985
GLSA-200710-27 https://security.gentoo.org/glsa/200710-27
RHSA-2008:0145 https://access.redhat.com/errata/RHSA-2008:0145
RHSA-2008:0165 https://access.redhat.com/errata/RHSA-2008:0165
USN-523-1 https://usn.ubuntu.com/523-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2007-4985
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.88919
EPSS Score 0.02137
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.