imagemagick update fixes multiple vulnerabilitie
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | imagemagick - security update | 28 May 201700:00 | – | osv |
![]() | imagemagick - security update | 25 May 201700:00 | – | osv |
![]() | imagemagick - security update | 11 Jun 201500:00 | – | osv |
![]() | imagemagick - security update | 22 Nov 201400:00 | – | osv |
![]() | CVE-2017-8344 | 30 Apr 201717:59 | – | osv |
![]() | CVE-2017-8357 | 30 Apr 201717:59 | – | osv |
![]() | CVE-2017-8346 | 30 Apr 201717:59 | – | osv |
![]() | CVE-2017-8343 | 30 Apr 201717:59 | – | osv |
![]() | CVE-2017-8348 | 30 Apr 201717:59 | – | osv |
![]() | Debian: Security Advisory (DLA-960-1) | 24 Jan 201800:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 8 | amd64 | libimage-magick-q16-perl | 8:6.8.9.9-5+deb8u9 | libimage-magick-q16-perl_8:6.8.9.9-5+deb8u9_amd64.deb |
Debian | 7 | armhf | libmagickwand-dev | 8:6.7.7.10-5+deb7u13 | libmagickwand-dev_8:6.7.7.10-5+deb7u13_armhf.deb |
Debian | 6 | all | imagemagick | 8:6.6.0.4-3+squeeze5 | imagemagick_8:6.6.0.4-3+squeeze5_all.deb |
Debian | 7 | all | imagemagick | 8:6.7.7.10-5+deb7u16 | imagemagick_8:6.7.7.10-5+deb7u16_all.deb |
Debian | 8 | amd64 | libgraphicsmagick++1-dev | 1.3.20-3+deb8u4 | libgraphicsmagick++1-dev_1.3.20-3+deb8u4_amd64.deb |
Debian | 7 | armel | libmagickwand5 | 8:6.7.7.10-5+deb7u13 | libmagickwand5_8:6.7.7.10-5+deb7u13_armel.deb |
Debian | 8 | arm64 | libmagick++-6.q16-dev | 8:6.8.9.9-5+deb8u1 | libmagick++-6.q16-dev_8:6.8.9.9-5+deb8u1_arm64.deb |
Debian | 8 | armhf | imagemagick | 8:6.8.9.9-5+deb8u9 | imagemagick_8:6.8.9.9-5+deb8u9_armhf.deb |
Debian | 6 | i386 | libmagickwand3 | 8:6.6.0.4-3+squeeze5 | libmagickwand3_8:6.6.0.4-3+squeeze5_i386.deb |
Debian | 8 | s390x | libmagickcore-6-arch-config | 8:6.8.9.9-5+deb8u9 | libmagickcore-6-arch-config_8:6.8.9.9-5+deb8u9_s390x.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo