Vulnerabilities
Vulnerable Software
Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.
CVSS Score
6.9
EPSS Score
0.001
Published
2010-11-22


Contact Us

Shodan ® - All rights reserved