{"id":"CVE-2016-10048","details":"Directory traversal vulnerability in magick/module.c in ImageMagick 6.9.4-7 allows remote attackers to load arbitrary modules via unspecified vectors.","modified":"2026-04-11T19:42:26.901116Z","published":"2017-03-23T17:59:00.343Z","related":["SUSE-SU-2017:0518-1","SUSE-SU-2017:0529-1","SUSE-SU-2017:0586-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"42.1"}],"cpe":"cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/12/26/9"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95186"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1410451"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"fixed":"fc6080f1321fd21e86ef916195cc110b05d9effb"}],"database_specific":{"source":"REFERENCES"}}],"database_specific":{"vanir_signatures":[{"deprecated":false,"id":"CVE-2016-10048-15eb4d36","digest":{"length":6423,"function_hash":"180479178335677613379413126608026315393"},"target":{"function":"GetMagickModulePath","file":"magick/module.c"},"source":"https://github.com/imagemagick/imagemagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb","signature_version":"v1","signature_type":"Function"},{"deprecated":false,"id":"CVE-2016-10048-29a4613a","digest":{"threshold":0.9,"line_hashes":["254663084424799046663263946918799950186","176640137577819480632893748421405998576","105333641635071008978131169944530324398","207621352220506383587083908700520373527"]},"target":{"file":"magick/xml-tree.c"},"source":"https://github.com/imagemagick/imagemagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb","signature_version":"v1","signature_type":"Line"},{"deprecated":false,"id":"CVE-2016-10048-4869e6fb","digest":{"threshold":0.9,"line_hashes":["310685665872715211784325447214736462005","255708272362830641186427078667559347040","252777549267635406776068621426262892817","283456026964158371157911958059435102785"]},"target":{"file":"magick/module.c"},"source":"https://github.com/imagemagick/imagemagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb","signature_version":"v1","signature_type":"Line"},{"deprecated":false,"id":"CVE-2016-10048-60135dc2","digest":{"length":7920,"function_hash":"219260750356804271061838233253888417015"},"target":{"function":"NewXMLTree","file":"magick/xml-tree.c"},"source":"https://github.com/imagemagick/imagemagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb","signature_version":"v1","signature_type":"Function"}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10048.json","vanir_signatures_modified":"2026-04-11T19:42:26Z"}},{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"last_affected":"a538ee5896a59f1bc51531e3f35ffdb0671c112c"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"6.9.4-7"}],"cpe":"cpe:2.3:a:imagemagick:imagemagick:6.9.4-7:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["6.9.4-0","6.9.4-1","6.9.4-2","6.9.4-3","6.9.4-4","6.9.4-5","6.9.4-6","6.9.4-7"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10048.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}