![]() |
Imagemagick Remote Execution Vulnerabilities
I was at my PHP Users group these evening and during the intro (Last month in PHP) it was brought up that some vulnerabilities had been discovered in imagemagick.
I do not do much with imagemagick anymore but I know that there are people here that run scripts that use it. I have not seen this being discussed here so I decided to post it so you can be aware of it. I am not sure of the technical details about the vulnerabilities other than they seem to have to do with user submitted images. There is a page describing the issues at https://imagetragick.com/. Here is what they say in the intro: Quote:
. |
Thanks for the heads up! :thumbsup
|
All times are GMT -7. The time now is 03:46 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123