An attacker can exploit multiple vulnerabilities in ImageMagick to potentially execute arbitrary code, manipulate data or memory, cause a denial-of-service condition, or conduct other unspecified attacks.
| Vendor | Product | Versions |
|---|---|---|
| imagemagick studio | imagemagick | — |